Support Support Downloads Knowledge Base Juniper Support Portal Community

Browse by Category: SIRT Advisory - Security Advisories

Browse articles related to the selected category. Change the site selector to view articles within other sites or find articles related to another product category. RSS

Sign in to display secured and recently viewed articles
 

 

Current Category:

Point your RSS reader here for a feed of this content



Pages: 5612345678910Next
Title ID ViewsLast Updated
2021-04 Security Bulletin: Junos OS: Multiple HTTP/2 vulnerabilities are resolved in remote procedure calls using gRPC remote procedure calls (gRPC) framework JSA1116725,288 288 days ago
2021-04 Security Bulletin: Junos OS: J-Web: Cross-site scripting attack allows an attacker to gain control of another users session. (CVE-2021-0275) JSA1116628,059 288 days ago
2021-04 Security Bulletin: Junos OS and Junos OS Evolved: Trio Chipset: Denial of Service due to packet destined to device's interfaces. (CVE-2021-0273) JSA1116427,811 288 days ago
2021-04 Security Bulletin: Junos OS: QFX10002-32Q, QFX10002-60C, QFX10002-72Q, QFX10008, QFX10016: In EVPN-VXLAN scenarios receipt of specific genuine packets by an adjacent attacker will cause a kernel memory leak in FPC. (CVE-2021-0272) JSA1116324,332 288 days ago
2021-04 Security Bulletin: Junos OS: EX2200-C Series, EX3200 Series, EX3300 Series, EX4200 Series, EX4500 Series, EX4550 Series, EX6210 Series, EX8208 Series, EX8216 Series: Receipt of a crafted ARP packet by an adjacent attacker will cause the sfid process to core. (CVE-2021-0271) JSA1116227,109 288 days ago
2021-04 Security Bulletin: Junos OS: PTX Series, QFX10K Series: A PTX/QFX FPC may restart unexpectedly with the "inline-Jflow" feature enabled on a large-scale deployment (CVE-2021-0270) JSA1116147,169 288 days ago
2021-04 Security Bulletin: Junos OS: J-Web can be compromised through reflected client-side HTTP parameter pollution attacks. (CVE-2021-0269) JSA1116027,498 288 days ago
2021-04 Security Bulletin: Junos OS: J-Web has an Improper Neutralization of CRLF Sequences in its HTTP Headers which allows an attacker to carry out multiple types of attacks. (CVE-2021-0268) JSA1115946,175 246 days ago
2021-04 Security Bulletin: Junos OS: Receipt of a crafted DHCP packet will cause the jdhcpd DHCP service to core. (CVE-2021-0267) JSA1115827,301 288 days ago
2021-04 Security Bulletin: cSRX: Use of Hard-coded Cryptographic Keys allows an attacker to take control of the device through device management services. (CVE-2021-0266) JSA1115724,155 288 days ago
2021-04 Security Bulletin: Contrail Insights: The REST API implementation allows an unauthenticated remote attacker to execute commands as root. (CVE-2021-0265) JSA1115622,236 288 days ago
2021-04 Security Bulletin: Junos OS and Junos OS Evolved: MX Series with MPC10/MPC11, PTX10003, PTX10008: Line card may crash and restart when traffic is hitting a firewall filter having a term with syslog action configured (CVE-2021-0264) JSA1115524,387 288 days ago
2021-04 Security Bulletin: Junos OS: PTX Series: Denial of Service in packet processing due to heavy route churn when J-Flow sampling is enabled (CVE-2021-0263) JSA1115423,194 288 days ago
2021-04 Security Bulletin: Junos OS: QFX10002-60C: Use after free vulnerability found during static code analysis (CVE-2021-0262) JSA1115323,558 288 days ago
2021-04 Security Bulletin: Junos OS: Denial of Service vulnerability in J-Web and web based (HTTP/HTTPS) services caused by a high number of specific requests (CVE-2021-0261) JSA1115227,670 288 days ago

Getting Up and Running with Junos

Getting Up and Running with Junos Security Alerts and Vulnerabilities Product Alerts and Software Release Notices Problem Report (PR) Search Tool EOL Notices and Bulletins JTAC User Guide Customer Care User Guide Pathfinder SRX High Availability Configurator SRX VPN Configurator Training Courses and Videos End User Licence Agreement Global Search