CVE Datenbank

Durchsuchbare Datenbank mit Sicherheitslücken. Filtere nach Hersteller, Schweregrad oder Zeitraum.

Zurücksetzen
25 CVEs gefunden (Seite 1/1)

CVE-2026-21902 - An Incorrect Permission Assignment for Critical Resource vulnerability in the On-Box Anomaly detecti

🏢 Juniper 📅 25.2.2026 📊 CVSS: 9.8
9.8

CVE-2025-21589 - An Authentication Bypass Using an Alternate Path or Channel vulnerability in Juniper Networks Sessio

🏢 Juniper 📅 27.1.2026 📊 CVSS: 9.8
9.8

CVE-2026-21921 - A Use After Free vulnerability in the chassis daemon (chassisd) of Juniper Networks Junos OS and Jun

🏢 Juniper 📅 15.1.2026 📊 CVSS: 6.5
6.5

CVE-2026-21920 - An Unchecked Return Value vulnerability in the DNS module of Juniper Networks Junos OS on SRX Series

🏢 Juniper 📅 15.1.2026 📊 CVSS: 7.5
7.5

CVE-2026-21918 - A Double Free vulnerability in the flow processing daemon (flowd) of Juniper Networks Junos OS on SR

🏢 Juniper 📅 15.1.2026 📊 CVSS: 7.5
7.5

CVE-2026-21917 - An Improper Validation of Syntactic Correctness of Input vulnerability in the Web-Filtering module o

🏢 Juniper 📅 15.1.2026 📊 CVSS: 7.5
7.5

CVE-2026-21914 - An Improper Locking vulnerability in the GTP plugin of Juniper Networks Junos OS on SRX Series allow

🏢 Juniper 📅 15.1.2026 📊 CVSS: 7.5
7.5

CVE-2026-21913 - An Incorrect Initialization of Resource vulnerability in the Internal Device Manager (IDM) of Junipe

🏢 Juniper 📅 15.1.2026 📊 CVSS: 7.5
7.5

CVE-2026-21912 - A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in the method to collect FPC Ether

🏢 Juniper 📅 15.1.2026 📊 CVSS: 5.5
5.5

CVE-2026-21911 - An Incorrect Calculation vulnerability in the Layer 2 Control Protocol Daemon (l2cpd) of Juniper

🏢 Juniper 📅 15.1.2026 📊 CVSS: 6.5
6.5

CVE-2026-21910 - An Improper Check for Unusual or Exceptional Conditions vulnerability in the packet forwarding engin

🏢 Juniper 📅 15.1.2026 📊 CVSS: 6.5
6.5

CVE-2026-21909 - A Missing Release of Memory after Effective Lifetime vulnerability in the routing protocol daemon (r

🏢 Juniper 📅 15.1.2026 📊 CVSS: 6.5
6.5

CVE-2026-21908 - A Use After Free vulnerability was identified in the 802.1X authentication daemon (dot1xd) of Junipe

🏢 Juniper 📅 15.1.2026 📊 CVSS: 7.1
7.1

CVE-2026-21907 - A Use of a Broken or Risky Cryptographic Algorithm vulnerability in the TLS/SSL server of Juniper Ne

🏢 Juniper 📅 15.1.2026 📊 CVSS: 5.9
5.9

CVE-2026-21906 - An Improper Handling of Exceptional Conditions vulnerability in the packet forwarding engine (PFE) o

🏢 Juniper 📅 15.1.2026 📊 CVSS: 7.5
7.5

CVE-2026-21905 - A Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in the SIP application layer

🏢 Juniper 📅 15.1.2026 📊 CVSS: 7.5
7.5

CVE-2026-21903 - A Stack-based Buffer Overflow vulnerability in the Packet Forwarding Engine (pfe) of Juniper Network

🏢 Juniper 📅 15.1.2026 📊 CVSS: 6.5
6.5

CVE-2026-0203 - An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Network

🏢 Juniper 📅 15.1.2026 📊 CVSS: 6.5
6.5

CVE-2025-60011 - An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon

🏢 Juniper 📅 15.1.2026 📊 CVSS: 5.8
5.8

CVE-2025-60007 - A NULL Pointer Dereference vulnerability in the chassis daemon (chassisd) of Juniper Networks Junos

🏢 Juniper 📅 15.1.2026 📊 CVSS: 5.5
5.5

CVE-2025-60003 - A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS a

🏢 Juniper 📅 15.1.2026 📊 CVSS: 7.5
7.5

CVE-2025-59961 - An Incorrect Permission Assignment for Critical Resource vulnerability in the Juniper DHCP daemon (j

🏢 Juniper 📅 15.1.2026 📊 CVSS: 5.5
5.5

CVE-2025-59960 - An Improper Check for Unusual or Exceptional Conditions vulnerability in the Juniper DHCP service (j

🏢 Juniper 📅 15.1.2026 📊 CVSS: 7.4
7.4

CVE-2025-59959 - An Untrusted Pointer Dereference vulnerability in the routing protocol daemon (rpd) of Juniper Netwo

🏢 Juniper 📅 15.1.2026 📊 CVSS: 5.5
5.5

CVE-2025-52987 - A clickjacking vulnerability exists in the web portal of Juniper Networks Paragon Automation (Pathfi

🏢 Juniper 📅 15.1.2026 📊 CVSS: 6.1
6.1

🏢 CVE nach Hersteller

Empfohlene Sicherheitstools

Unterstütze uns durch einen Kauf - wir erhalten eine kleine Provision.