{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 21.4-EVO ant\u00e9rieures \u00e0 21.4R2-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on QFX5000 Series and EX4600 Series versions 22.4 ant\u00e9rieures \u00e0 22.4R3","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on MX Series versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S3","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved on ACX7000 Series versions 22.1-EVO ant\u00e9rieures \u00e0 22.1R3-S6-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on SRX4600 and SRX5000 Series versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 23.2 ant\u00e9rieures \u00e0 23.2R2-S1","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Session Smart Router versions 6.2 ant\u00e9rieures \u00e0 SSR-6.2.5-r2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on MX Series versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S5","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved on ACX7000 Series versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-S2-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved on ACX7000 Series versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S7","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on MX Series with SPC3 line card versions 21.2 ant\u00e9rieures \u00e0 21.2R3-S8","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S6","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 ant\u00e9rieures \u00e0 22.3R3","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 21.3-EVO ant\u00e9rieures \u00e0 21.3R3-S5-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 21.2-EVO ant\u00e9rieures \u00e0 21.2R3-S7-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions ant\u00e9rieures \u00e0 20.4R3-S9","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved on ACX7000 Series versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 22.4 ant\u00e9rieures \u00e0 22.4R2-S2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on SRX4600 and SRX5000 Series versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S4","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on MX Series versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on MX Series versions 22.4 ant\u00e9rieures \u00e0 22.4R3","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on QFX5000 Series and EX4600 Series versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Session Smart Router versions 6.1 ant\u00e9rieures \u00e0 SSR-6.1.8-lts","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 20.4 ant\u00e9rieures \u00e0 20.4R3-S10","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 ant\u00e9rieures \u00e0 22.4R3","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 24.2-EVO ant\u00e9rieures \u00e0 24.2R2-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.4 ant\u00e9rieures \u00e0 22.4R3","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S1","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.3 ant\u00e9rieures \u00e0 21.3R3-S5","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on MX Series versions 23.2 ant\u00e9rieures \u00e0 23.2R2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on MX Series with SPC3 line card versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 21.4 ant\u00e9rieures \u00e0 21.4R2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on MX Series with SPC3 line card versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S3","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R1-S2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R3-S3-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions ant\u00e9rieures \u00e0 23.2R1-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions ant\u00e9rieures \u00e0 21.4R3-S8-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on SRX4600 and SRX5000 Series versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S6","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.2 ant\u00e9rieures \u00e0 21.2R3-S6","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on MX Series versions ant\u00e9rieures \u00e0 21.2R3-S6","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on QFX5000 Series and EX4600 Series versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S3","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R1-S1-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 23.2 ant\u00e9rieures \u00e0 23.2R2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on SRX4600 and SRX5000 Series versions 23.2 ant\u00e9rieures \u00e0 23.2R2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions ant\u00e9rieures \u00e0 21.4R3-S8","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions ant\u00e9rieures \u00e0 22.4R3-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on SRX4600 and SRX5000 Series versions 23.4 ant\u00e9rieures \u00e0 23.4R1-S1","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on QFX5000 Series and EX4600 Series versions ant\u00e9rieures \u00e0 21.2R3-S7","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Session Smart Router versions ant\u00e9rieures \u00e0 SSR-5.6.14","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on QFX5000 Series and EX4600 Series versions 23.2 ant\u00e9rieures \u00e0 23.2R2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions ant\u00e9rieures \u00e0 21.2R3-S8-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions ant\u00e9rieures \u00e0 21.2R3-S8","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S1","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved on ACX7000 Series versions ant\u00e9rieures \u00e0 21.4R3-S7-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on QFX5000 Series and EX4600 Series versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S5","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on MX Series with SPC3 line card versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved on ACX7000 Series versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R3-S3-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on MX Series with SPC3 line card versions 23.4 ant\u00e9rieures \u00e0 23.4R2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 22.3 ant\u00e9rieures \u00e0 22.3R1-S2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on SRX4600 and SRX5000 Series versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S3","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R1-S1-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R3-S3-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions ant\u00e9rieures \u00e0 21.2R3-S8","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos Space versions ant\u00e9rieures \u00e0 24.1R1","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 22.3-EVO ant\u00e9rieures \u00e0 22.3R2-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S3","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S10-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on MX Series with SPC3 line card versions 22.4 ant\u00e9rieures \u00e0 22.4R3-S1","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 ant\u00e9rieures \u00e0 22.4R1-S2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 22.4-EVO ant\u00e9rieures \u00e0 22.4R2-S2-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved on ACX7000 Series versions ant\u00e9rieures \u00e0 21.2R3-S8-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.4 ant\u00e9rieures \u00e0 22.4R2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-S1-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on MX Series with SPC3 line card versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S5","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions ant\u00e9rieures \u00e0 before 22.1R3-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on SRX Series, MX Series with SPC3 and NFX350 versions 22.3 ant\u00e9rieures \u00e0 22.3R2-S1","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 21.4-EVO ant\u00e9rieures \u00e0 21.4R3-S8-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved on ACX7000 Series versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R3-S4-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"SRX Series and MX Series with SPC3 and MS-MPC/MIC versions 22.1 ant\u00e9rieures \u00e0 22.1R3-S4","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 21.3 ant\u00e9rieures \u00e0 21.3R3-S5","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions ant\u00e9rieures \u00e0 22.1R2-S2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 22.1-EVO ant\u00e9rieures \u00e0 22.1R3-S6-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 22.2 ant\u00e9rieures \u00e0 22.2R3-S4","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on SRX4600 and SRX5000 Series versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S7","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved on ACX7000 Series versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R1-S2-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions ant\u00e9rieures \u00e0 22.4R2-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on MX Series with SPC3 line card versions 23.2 ant\u00e9rieures \u00e0 23.2R2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 22.2 ant\u00e9rieures \u00e0 22.2R2-S1","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 23.1 ant\u00e9rieures \u00e0 23.1R2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on MX Series versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 22.3 ant\u00e9rieures \u00e0 22.3R3-S3","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R3-S4-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on SRX4600 and SRX5000 Series versions ant\u00e9rieures \u00e0 21.2R3-S8","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 22.3 ant\u00e9rieures \u00e0 22.3R2-S2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on QFX5000 Series and EX4600 Series versions 21.4 ant\u00e9rieures \u00e0 21.4R3-S6","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 22.2-EVO ant\u00e9rieures \u00e0 22.2R2-S1-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS on SRX4600 and SRX5000 Series versions 23.4 ant\u00e9rieures \u00e0 23.4R2","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R1-S2-EVO","product":{"name":"N/A","vendor":{"name":"Juniper Networks","scada":false}}}],"affected_systems_content":"","content":"## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des correctifs (cf. section Documentation).","cves":[{"name":"CVE-2024-39560","url":"https://www.cve.org/CVERecord?id=CVE-2024-39560"},{"name":"CVE-2023-32435","url":"https://www.cve.org/CVERecord?id=CVE-2023-32435"},{"name":"CVE-2021-44906","url":"https://www.cve.org/CVERecord?id=CVE-2021-44906"},{"name":"CVE-2024-20919","url":"https://www.cve.org/CVERecord?id=CVE-2024-20919"},{"name":"CVE-2024-39554","url":"https://www.cve.org/CVERecord?id=CVE-2024-39554"},{"name":"CVE-2023-21843","url":"https://www.cve.org/CVERecord?id=CVE-2023-21843"},{"name":"CVE-2024-39539","url":"https://www.cve.org/CVERecord?id=CVE-2024-39539"},{"name":"CVE-2021-36160","url":"https://www.cve.org/CVERecord?id=CVE-2021-36160"},{"name":"CVE-2020-12401","url":"https://www.cve.org/CVERecord?id=CVE-2020-12401"},{"name":"CVE-2024-39558","url":"https://www.cve.org/CVERecord?id=CVE-2024-39558"},{"name":"CVE-2022-30522","url":"https://www.cve.org/CVERecord?id=CVE-2022-30522"},{"name":"CVE-2021-37701","url":"https://www.cve.org/CVERecord?id=CVE-2021-37701"},{"name":"CVE-2022-21460","url":"https://www.cve.org/CVERecord?id=CVE-2022-21460"},{"name":"CVE-2021-31535","url":"https://www.cve.org/CVERecord?id=CVE-2021-31535"},{"name":"CVE-2022-36760","url":"https://www.cve.org/CVERecord?id=CVE-2022-36760"},{"name":"CVE-2021-33034","url":"https://www.cve.org/CVERecord?id=CVE-2021-33034"},{"name":"CVE-2024-20926","url":"https://www.cve.org/CVERecord?id=CVE-2024-20926"},{"name":"CVE-2024-39552","url":"https://www.cve.org/CVERecord?id=CVE-2024-39552"},{"name":"CVE-2021-27290","url":"https://www.cve.org/CVERecord?id=CVE-2021-27290"},{"name":"CVE-2019-11727","url":"https://www.cve.org/CVERecord?id=CVE-2019-11727"},{"name":"CVE-2023-3390","url":"https://www.cve.org/CVERecord?id=CVE-2023-3390"},{"name":"CVE-2023-4004","url":"https://www.cve.org/CVERecord?id=CVE-2023-4004"},{"name":"CVE-2021-29469","url":"https://www.cve.org/CVERecord?id=CVE-2021-29469"},{"name":"CVE-2023-2002","url":"https://www.cve.org/CVERecord?id=CVE-2023-2002"},{"name":"CVE-2023-21830","url":"https://www.cve.org/CVERecord?id=CVE-2023-21830"},{"name":"CVE-2022-22823","url":"https://www.cve.org/CVERecord?id=CVE-2022-22823"},{"name":"CVE-2021-23440","url":"https://www.cve.org/CVERecord?id=CVE-2021-23440"},{"name":"CVE-2021-32804","url":"https://www.cve.org/CVERecord?id=CVE-2021-32804"},{"name":"CVE-2020-13950","url":"https://www.cve.org/CVERecord?id=CVE-2020-13950"},{"name":"CVE-2021-26691","url":"https://www.cve.org/CVERecord?id=CVE-2021-26691"},{"name":"CVE-2024-39546","url":"https://www.cve.org/CVERecord?id=CVE-2024-39546"},{"name":"CVE-2024-39540","url":"https://www.cve.org/CVERecord?id=CVE-2024-39540"},{"name":"CVE-2018-3737","url":"https://www.cve.org/CVERecord?id=CVE-2018-3737"},{"name":"CVE-2024-39543","url":"https://www.cve.org/CVERecord?id=CVE-2024-39543"},{"name":"CVE-2020-11984","url":"https://www.cve.org/CVERecord?id=CVE-2020-11984"},{"name":"CVE-2022-22721","url":"https://www.cve.org/CVERecord?id=CVE-2022-22721"},{"name":"CVE-2021-35624","url":"https://www.cve.org/CVERecord?id=CVE-2021-35624"},{"name":"CVE-2023-35788","url":"https://www.cve.org/CVERecord?id=CVE-2023-35788"},{"name":"CVE-2023-32067","url":"https://www.cve.org/CVERecord?id=CVE-2023-32067"},{"name":"CVE-2024-39514","url":"https://www.cve.org/CVERecord?id=CVE-2024-39514"},{"name":"CVE-2022-25147","url":"https://www.cve.org/CVERecord?id=CVE-2022-25147"},{"name":"CVE-2021-35604","url":"https://www.cve.org/CVERecord?id=CVE-2021-35604"},{"name":"CVE-2021-42013","url":"https://www.cve.org/CVERecord?id=CVE-2021-42013"},{"name":"CVE-2023-34059","url":"https://www.cve.org/CVERecord?id=CVE-2023-34059"},{"name":"CVE-2024-39529","url":"https://www.cve.org/CVERecord?id=CVE-2024-39529"},{"name":"CVE-2006-20001","url":"https://www.cve.org/CVERecord?id=CVE-2006-20001"},{"name":"CVE-2024-20921","url":"https://www.cve.org/CVERecord?id=CVE-2024-20921"},{"name":"CVE-2021-2385","url":"https://www.cve.org/CVERecord?id=CVE-2021-2385"},{"name":"CVE-2022-29167","url":"https://www.cve.org/CVERecord?id=CVE-2022-29167"},{"name":"CVE-2020-7774","url":"https://www.cve.org/CVERecord?id=CVE-2020-7774"},{"name":"CVE-2019-10747","url":"https://www.cve.org/CVERecord?id=CVE-2019-10747"},{"name":"CVE-2023-34058","url":"https://www.cve.org/CVERecord?id=CVE-2023-34058"},{"name":"CVE-2011-5094","url":"https://www.cve.org/CVERecord?id=CVE-2011-5094"},{"name":"CVE-2019-16776","url":"https://www.cve.org/CVERecord?id=CVE-2019-16776"},{"name":"CVE-2022-21589","url":"https://www.cve.org/CVERecord?id=CVE-2022-21589"},{"name":"CVE-2022-25315","url":"https://www.cve.org/CVERecord?id=CVE-2022-25315"},{"name":"CVE-2019-10097","url":"https://www.cve.org/CVERecord?id=CVE-2019-10097"},{"name":"CVE-2022-22822","url":"https://www.cve.org/CVERecord?id=CVE-2022-22822"},{"name":"CVE-2023-2828","url":"https://www.cve.org/CVERecord?id=CVE-2023-2828"},{"name":"CVE-2023-22081","url":"https://www.cve.org/CVERecord?id=CVE-2023-22081"},{"name":"CVE-2023-4206","url":"https://www.cve.org/CVERecord?id=CVE-2023-4206"},{"name":"CVE-2022-21304","url":"https://www.cve.org/CVERecord?id=CVE-2022-21304"},{"name":"CVE-2023-3090","url":"https://www.cve.org/CVERecord?id=CVE-2023-3090"},{"name":"CVE-2024-39536","url":"https://www.cve.org/CVERecord?id=CVE-2024-39536"},{"name":"CVE-2024-39555","url":"https://www.cve.org/CVERecord?id=CVE-2024-39555"},{"name":"CVE-2022-3564","url":"https://www.cve.org/CVERecord?id=CVE-2022-3564"},{"name":"CVE-2023-3611","url":"https://www.cve.org/CVERecord?id=CVE-2023-3611"},{"name":"CVE-2020-13938","url":"https://www.cve.org/CVERecord?id=CVE-2020-13938"},{"name":"CVE-2016-10540","url":"https://www.cve.org/CVERecord?id=CVE-2016-10540"},{"name":"CVE-2019-10082","url":"https://www.cve.org/CVERecord?id=CVE-2019-10082"},{"name":"CVE-2023-42753","url":"https://www.cve.org/CVERecord?id=CVE-2023-42753"},{"name":"CVE-2016-1000232","url":"https://www.cve.org/CVERecord?id=CVE-2016-1000232"},{"name":"CVE-2015-9262","url":"https://www.cve.org/CVERecord?id=CVE-2015-9262"},{"name":"CVE-2023-32360","url":"https://www.cve.org/CVERecord?id=CVE-2023-32360"},{"name":"CVE-2021-37713","url":"https://www.cve.org/CVERecord?id=CVE-2021-37713"},{"name":"CVE-2021-39275","url":"https://www.cve.org/CVERecord?id=CVE-2021-39275"},{"name":"CVE-2024-39561","url":"https://www.cve.org/CVERecord?id=CVE-2024-39561"},{"name":"CVE-2022-21303","url":"https://www.cve.org/CVERecord?id=CVE-2022-21303"},{"name":"CVE-2019-17023","url":"https://www.cve.org/CVERecord?id=CVE-2019-17023"},{"name":"CVE-2016-4658","url":"https://www.cve.org/CVERecord?id=CVE-2016-4658"},{"name":"CVE-2020-35452","url":"https://www.cve.org/CVERecord?id=CVE-2020-35452"},{"name":"CVE-2023-4207","url":"https://www.cve.org/CVERecord?id=CVE-2023-4207"},{"name":"CVE-2022-21617","url":"https://www.cve.org/CVERecord?id=CVE-2022-21617"},{"name":"CVE-2023-0767","url":"https://www.cve.org/CVERecord?id=CVE-2023-0767"},{"name":"CVE-2022-41741","url":"https://www.cve.org/CVERecord?id=CVE-2022-41741"},{"name":"CVE-2023-22067","url":"https://www.cve.org/CVERecord?id=CVE-2023-22067"},{"name":"CVE-2021-37712","url":"https://www.cve.org/CVERecord?id=CVE-2021-37712"},{"name":"CVE-2022-23852","url":"https://www.cve.org/CVERecord?id=CVE-2022-23852"},{"name":"CVE-2023-30630","url":"https://www.cve.org/CVERecord?id=CVE-2023-30630"},{"name":"CVE-2022-21608","url":"https://www.cve.org/CVERecord?id=CVE-2022-21608"},{"name":"CVE-2022-2526","url":"https://www.cve.org/CVERecord?id=CVE-2022-2526"},{"name":"CVE-2023-20593","url":"https://www.cve.org/CVERecord?id=CVE-2023-20593"},{"name":"CVE-2024-39535","url":"https://www.cve.org/CVERecord?id=CVE-2024-39535"},{"name":"CVE-2024-39545","url":"https://www.cve.org/CVERecord?id=CVE-2024-39545"},{"name":"CVE-2024-39531","url":"https://www.cve.org/CVERecord?id=CVE-2024-39531"},{"name":"CVE-2022-41742","url":"https://www.cve.org/CVERecord?id=CVE-2022-41742"},{"name":"CVE-2019-16777","url":"https://www.cve.org/CVERecord?id=CVE-2019-16777"},{"name":"CVE-2021-2389","url":"https://www.cve.org/CVERecord?id=CVE-2021-2389"},{"name":"CVE-2023-21840","url":"https://www.cve.org/CVERecord?id=CVE-2023-21840"},{"name":"CVE-2019-10081","url":"https://www.cve.org/CVERecord?id=CVE-2019-10081"},{"name":"CVE-2020-1934","url":"https://www.cve.org/CVERecord?id=CVE-2020-1934"},{"name":"CVE-2022-30556","url":"https://www.cve.org/CVERecord?id=CVE-2022-30556"},{"name":"CVE-2020-8648","url":"https://www.cve.org/CVERecord?id=CVE-2020-8648"},{"name":"CVE-2022-21270","url":"https://www.cve.org/CVERecord?id=CVE-2022-21270"},{"name":"CVE-2023-21963","url":"https://www.cve.org/CVERecord?id=CVE-2023-21963"},{"name":"CVE-2022-25235","url":"https://www.cve.org/CVERecord?id=CVE-2022-25235"},{"name":"CVE-2023-21980","url":"https://www.cve.org/CVERecord?id=CVE-2023-21980"},{"name":"CVE-2024-39530","url":"https://www.cve.org/CVERecord?id=CVE-2024-39530"},{"name":"CVE-2024-39532","url":"https://www.cve.org/CVERecord?id=CVE-2024-39532"},{"name":"CVE-2023-27522","url":"https://www.cve.org/CVERecord?id=CVE-2023-27522"},{"name":"CVE-2024-39557","url":"https://www.cve.org/CVERecord?id=CVE-2024-39557"},{"name":"CVE-2021-2390","url":"https://www.cve.org/CVERecord?id=CVE-2021-2390"},{"name":"CVE-2024-39550","url":"https://www.cve.org/CVERecord?id=CVE-2024-39550"},{"name":"CVE-2022-28615","url":"https://www.cve.org/CVERecord?id=CVE-2022-28615"},{"name":"CVE-2022-21451","url":"https://www.cve.org/CVERecord?id=CVE-2022-21451"},{"name":"CVE-2014-10064","url":"https://www.cve.org/CVERecord?id=CVE-2014-10064"},{"name":"CVE-2024-39511","url":"https://www.cve.org/CVERecord?id=CVE-2024-39511"},{"name":"CVE-2022-23943","url":"https://www.cve.org/CVERecord?id=CVE-2022-23943"},{"name":"CVE-2024-39548","url":"https://www.cve.org/CVERecord?id=CVE-2024-39548"},{"name":"CVE-2020-11993","url":"https://www.cve.org/CVERecord?id=CVE-2020-11993"},{"name":"CVE-2023-22652","url":"https://www.cve.org/CVERecord?id=CVE-2023-22652"},{"name":"CVE-2024-39528","url":"https://www.cve.org/CVERecord?id=CVE-2024-39528"},{"name":"CVE-2023-3341","url":"https://www.cve.org/CVERecord?id=CVE-2023-3341"},{"name":"CVE-2023-22025","url":"https://www.cve.org/CVERecord?id=CVE-2023-22025"},{"name":"CVE-2021-43527","url":"https://www.cve.org/CVERecord?id=CVE-2021-43527"},{"name":"CVE-2022-37434","url":"https://www.cve.org/CVERecord?id=CVE-2022-37434"},{"name":"CVE-2024-39559","url":"https://www.cve.org/CVERecord?id=CVE-2024-39559"},{"name":"CVE-2014-7191","url":"https://www.cve.org/CVERecord?id=CVE-2014-7191"},{"name":"CVE-2021-2356","url":"https://www.cve.org/CVERecord?id=CVE-2021-2356"},{"name":"CVE-2020-36049","url":"https://www.cve.org/CVERecord?id=CVE-2020-36049"},{"name":"CVE-2023-4208","url":"https://www.cve.org/CVERecord?id=CVE-2023-4208"},{"name":"CVE-2021-41524","url":"https://www.cve.org/CVERecord?id=CVE-2021-41524"},{"name":"CVE-2022-3517","url":"https://www.cve.org/CVERecord?id=CVE-2022-3517"},{"name":"CVE-2020-12402","url":"https://www.cve.org/CVERecord?id=CVE-2020-12402"},{"name":"CVE-2019-11719","url":"https://www.cve.org/CVERecord?id=CVE-2019-11719"},{"name":"CVE-2021-34798","url":"https://www.cve.org/CVERecord?id=CVE-2021-34798"},{"name":"CVE-2024-39519","url":"https://www.cve.org/CVERecord?id=CVE-2024-39519"},{"name":"CVE-2021-32803","url":"https://www.cve.org/CVERecord?id=CVE-2021-32803"},{"name":"CVE-2019-17006","url":"https://www.cve.org/CVERecord?id=CVE-2019-17006"},{"name":"CVE-2022-21595","url":"https://www.cve.org/CVERecord?id=CVE-2022-21595"},{"name":"CVE-2019-16775","url":"https://www.cve.org/CVERecord?id=CVE-2019-16775"},{"name":"CVE-2020-12403","url":"https://www.cve.org/CVERecord?id=CVE-2020-12403"},{"name":"CVE-2023-3776","url":"https://www.cve.org/CVERecord?id=CVE-2023-3776"},{"name":"CVE-2023-2700","url":"https://www.cve.org/CVERecord?id=CVE-2023-2700"},{"name":"CVE-2020-7754","url":"https://www.cve.org/CVERecord?id=CVE-2020-7754"},{"name":"CVE-2024-39533","url":"https://www.cve.org/CVERecord?id=CVE-2024-39533"},{"name":"CVE-2021-22543","url":"https://www.cve.org/CVERecord?id=CVE-2021-22543"},{"name":"CVE-2021-33909","url":"https://www.cve.org/CVERecord?id=CVE-2021-33909"},{"name":"CVE-2021-26690","url":"https://www.cve.org/CVERecord?id=CVE-2021-26690"},{"name":"CVE-2022-22719","url":"https://www.cve.org/CVERecord?id=CVE-2022-22719"},{"name":"CVE-2022-40674","url":"https://www.cve.org/CVERecord?id=CVE-2022-40674"},{"name":"CVE-2022-46663","url":"https://www.cve.org/CVERecord?id=CVE-2022-46663"},{"name":"CVE-2011-1473","url":"https://www.cve.org/CVERecord?id=CVE-2011-1473"},{"name":"CVE-2024-39513","url":"https://www.cve.org/CVERecord?id=CVE-2024-39513"},{"name":"CVE-2021-3803","url":"https://www.cve.org/CVERecord?id=CVE-2021-3803"},{"name":"CVE-2022-21417","url":"https://www.cve.org/CVERecord?id=CVE-2022-21417"},{"name":"CVE-2024-39518","url":"https://www.cve.org/CVERecord?id=CVE-2024-39518"},{"name":"CVE-2023-37450","url":"https://www.cve.org/CVERecord?id=CVE-2023-37450"},{"name":"CVE-2021-30641","url":"https://www.cve.org/CVERecord?id=CVE-2021-30641"},{"name":"CVE-2021-3177","url":"https://www.cve.org/CVERecord?id=CVE-2021-3177"},{"name":"CVE-2020-7660","url":"https://www.cve.org/CVERecord?id=CVE-2020-7660"},{"name":"CVE-2022-31813","url":"https://www.cve.org/CVERecord?id=CVE-2022-31813"},{"name":"CVE-2023-34969","url":"https://www.cve.org/CVERecord?id=CVE-2023-34969"},{"name":"CVE-2019-9517","url":"https://www.cve.org/CVERecord?id=CVE-2019-9517"},{"name":"CVE-2018-20834","url":"https://www.cve.org/CVERecord?id=CVE-2018-20834"},{"name":"CVE-2020-12362","url":"https://www.cve.org/CVERecord?id=CVE-2020-12362"},{"name":"CVE-2020-1927","url":"https://www.cve.org/CVERecord?id=CVE-2020-1927"},{"name":"CVE-2022-21592","url":"https://www.cve.org/CVERecord?id=CVE-2022-21592"},{"name":"CVE-2021-3347","url":"https://www.cve.org/CVERecord?id=CVE-2021-3347"},{"name":"CVE-2022-25236","url":"https://www.cve.org/CVERecord?id=CVE-2022-25236"},{"name":"CVE-2023-25690","url":"https://www.cve.org/CVERecord?id=CVE-2023-25690"},{"name":"CVE-2021-2342","url":"https://www.cve.org/CVERecord?id=CVE-2021-2342"},{"name":"CVE-2022-22720","url":"https://www.cve.org/CVERecord?id=CVE-2022-22720"},{"name":"CVE-2017-15010","url":"https://www.cve.org/CVERecord?id=CVE-2017-15010"},{"name":"CVE-2019-10092","url":"https://www.cve.org/CVERecord?id=CVE-2019-10092"},{"name":"CVE-2024-39541","url":"https://www.cve.org/CVERecord?id=CVE-2024-39541"},{"name":"CVE-2021-44224","url":"https://www.cve.org/CVERecord?id=CVE-2021-44224"},{"name":"CVE-2024-39537","url":"https://www.cve.org/CVERecord?id=CVE-2024-39537"},{"name":"CVE-2022-21444","url":"https://www.cve.org/CVERecord?id=CVE-2022-21444"},{"name":"CVE-2019-17567","url":"https://www.cve.org/CVERecord?id=CVE-2019-17567"},{"name":"CVE-2018-7408","url":"https://www.cve.org/CVERecord?id=CVE-2018-7408"},{"name":"CVE-2019-20149","url":"https://www.cve.org/CVERecord?id=CVE-2019-20149"},{"name":"CVE-2024-20932","url":"https://www.cve.org/CVERecord?id=CVE-2024-20932"},{"name":"CVE-2023-35001","url":"https://www.cve.org/CVERecord?id=CVE-2023-35001"},{"name":"CVE-2024-39551","url":"https://www.cve.org/CVERecord?id=CVE-2024-39551"},{"name":"CVE-2023-4863","url":"https://www.cve.org/CVERecord?id=CVE-2023-4863"},{"name":"CVE-2022-29404","url":"https://www.cve.org/CVERecord?id=CVE-2022-29404"},{"name":"CVE-2020-14145","url":"https://www.cve.org/CVERecord?id=CVE-2020-14145"},{"name":"CVE-2019-11756","url":"https://www.cve.org/CVERecord?id=CVE-2019-11756"},{"name":"CVE-2024-20918","url":"https://www.cve.org/CVERecord?id=CVE-2024-20918"},{"name":"CVE-2024-39565","url":"https://www.cve.org/CVERecord?id=CVE-2024-39565"},{"name":"CVE-2021-31618","url":"https://www.cve.org/CVERecord?id=CVE-2021-31618"},{"name":"CVE-2022-21344","url":"https://www.cve.org/CVERecord?id=CVE-2022-21344"},{"name":"CVE-2023-24329","url":"https://www.cve.org/CVERecord?id=CVE-2023-24329"},{"name":"CVE-2024-39549","url":"https://www.cve.org/CVERecord?id=CVE-2024-39549"},{"name":"CVE-2022-21367","url":"https://www.cve.org/CVERecord?id=CVE-2022-21367"},{"name":"CVE-2021-33193","url":"https://www.cve.org/CVERecord?id=CVE-2021-33193"},{"name":"CVE-2021-41773","url":"https://www.cve.org/CVERecord?id=CVE-2021-41773"},{"name":"CVE-2020-11668","url":"https://www.cve.org/CVERecord?id=CVE-2020-11668"},{"name":"CVE-2022-26377","url":"https://www.cve.org/CVERecord?id=CVE-2022-26377"},{"name":"CVE-2021-44790","url":"https://www.cve.org/CVERecord?id=CVE-2021-44790"},{"name":"CVE-2020-9490","url":"https://www.cve.org/CVERecord?id=CVE-2020-9490"},{"name":"CVE-2020-28502","url":"https://www.cve.org/CVERecord?id=CVE-2020-28502"},{"name":"CVE-2024-39556","url":"https://www.cve.org/CVERecord?id=CVE-2024-39556"},{"name":"CVE-2022-37436","url":"https://www.cve.org/CVERecord?id=CVE-2022-37436"},{"name":"CVE-2021-33033","url":"https://www.cve.org/CVERecord?id=CVE-2021-33033"},{"name":"CVE-2023-32439","url":"https://www.cve.org/CVERecord?id=CVE-2023-32439"},{"name":"CVE-2020-12400","url":"https://www.cve.org/CVERecord?id=CVE-2020-12400"},{"name":"CVE-2023-21912","url":"https://www.cve.org/CVERecord?id=CVE-2023-21912"},{"name":"CVE-2022-28330","url":"https://www.cve.org/CVERecord?id=CVE-2022-28330"},{"name":"CVE-2024-39542","url":"https://www.cve.org/CVERecord?id=CVE-2024-39542"},{"name":"CVE-2022-21454","url":"https://www.cve.org/CVERecord?id=CVE-2022-21454"},{"name":"CVE-2017-1000048","url":"https://www.cve.org/CVERecord?id=CVE-2017-1000048"},{"name":"CVE-2022-21427","url":"https://www.cve.org/CVERecord?id=CVE-2022-21427"},{"name":"CVE-2021-40438","url":"https://www.cve.org/CVERecord?id=CVE-2021-40438"},{"name":"CVE-2024-20945","url":"https://www.cve.org/CVERecord?id=CVE-2024-20945"},{"name":"CVE-2022-22824","url":"https://www.cve.org/CVERecord?id=CVE-2022-22824"},{"name":"CVE-2020-6829","url":"https://www.cve.org/CVERecord?id=CVE-2020-6829"},{"name":"CVE-2021-2372","url":"https://www.cve.org/CVERecord?id=CVE-2021-2372"},{"name":"CVE-2022-21245","url":"https://www.cve.org/CVERecord?id=CVE-2022-21245"},{"name":"CVE-2020-28469","url":"https://www.cve.org/CVERecord?id=CVE-2020-28469"},{"name":"CVE-2024-20952","url":"https://www.cve.org/CVERecord?id=CVE-2024-20952"},{"name":"CVE-2019-10098","url":"https://www.cve.org/CVERecord?id=CVE-2019-10098"},{"name":"CVE-2024-39538","url":"https://www.cve.org/CVERecord?id=CVE-2024-39538"},{"name":"CVE-2022-28614","url":"https://www.cve.org/CVERecord?id=CVE-2022-28614"}],"links":[],"reference":"CERTFR-2024-AVI-0575","revisions":[{"description":"Version initiale","revision_date":"2024-07-12T00:00:00.000000"},{"description":"Correction d'identifiants CVE erron\u00e9s","revision_date":"2024-10-15T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Injection de code indirecte \u00e0 distance (XSS)"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d'entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks","vendor_advisories":[{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83001","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Inconsistent-information-in-the-TE-database-can-lead-to-an-rpd-crash-CVE-2024-39541"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82976","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-The-802-1X-Authentication-Daemon-crashes-on-running-a-specific-command-CVE-2024-39511"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83027","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Session-Smart-Router-Multiple-vulnerabilities-resolved"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83021","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX4600-SRX5000-Series-TCP-packets-with-SYN-FIN-or-SYN-RST-are-transferred-after-enabling-no-syn-check-with-Express-Path-CVE-2024-39561"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83018","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-specific-PIM-packet-causes-rpd-crash-when-PIM-is-configured-along-with-MoFRR-CVE-2024-39558"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82987","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-RPD-crashes-upon-concurrent-deletion-of-a-routing-instance-and-receipt-of-an-SNMP-request-CVE-2024-39528"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82982","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-MX240-MX480-MX960-platforms-using-MPC10E-Memory-leak-will-be-observed-when-subscribed-to-a-specific-subscription-on-Junos-Telemetry-Interface-CVE-2024-39518"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83012","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-line-card-Port-flaps-causes-rtlogd-memory-leak-leading-to-Denial-of-Service-CVE-2024-39550"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83019","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Receipt-of-a-specific-TCP-packet-may-result-in-a-system-crash-vmcore-on-dual-RE-systems-with-NSR-enabled-CVE-2024-39559"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83004","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-large-RPKI-RTR-PDU-packet-can-cause-rpd-to-crash-CVE-2024-39543"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83010","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Receipt-of-specific-packets-in-the-aftmand-process-will-lead-to-a-memory-leak-CVE-2024-39548"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83014","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-BGP-multipath-incremental-calculation-is-resulting-in-an-rpd-crash-CVE-2024-39554"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82996","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Flaps-of-BFD-sessions-with-authentication-cause-a-ppmd-memory-leak-CVE-2024-39536"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82980","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receiving-specific-traffic-on-devices-with-EVPN-VPWS-with-IGMP-snooping-enabled-will-cause-the-rpd-to-crash-CVE-2024-39514"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83000","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-Specific-valid-TCP-traffic-can-cause-a-pfe-crash-CVE-2024-39540"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83008","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Local-low-privilege-user-can-gain-root-permissions-leading-to-privilege-escalation-CVE-2024-39546"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82991","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Protocol-specific-DDoS-configuration-affects-other-protocols-CVE-2024-39531"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83011","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Receipt-of-malformed-BGP-path-attributes-leads-to-a-memory-leak-CVE-2024-39549"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82989","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Attempting-to-access-specific-sensors-on-platforms-not-supporting-these-will-lead-to-a-chassisd-crash-CVE-2024-39530"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82997","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-Ports-which-have-been-inadvertently-exposed-can-be-reached-over-the-network-CVE-2024-39537"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83023","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-EX-Series-J-Web-An-unauthenticated-network-based-attacker-can-perform-XPATH-injection-attack-against-a-device-CVE-2024-39565"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83026","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R1-release"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83013","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-and-MS-MPC-MIC-Receipt-of-specific-packets-in-H-323-ALG-causes-traffic-drop-CVE-2024-39551"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83002","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-malformed-CFM-packet-or-specific-transit-traffic-leads-to-FPC-crash-CVE-2024-39542"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83015","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-a-specific-malformed-BGP-update-causes-the-session-to-reset-CVE-2024-39555"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83007","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-with-SPC3-and-NFX350-When-VPN-tunnels-parameters-are-not-matching-the-iked-process-will-crash-CVE-2024-39545"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82995","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-When-specific-traffic-is-received-in-a-VPLS-scenario-evo-pfemand-crashes-CVE-2024-39535"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82993","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-QFX5000-Series-and-EX4600-Series-Output-firewall-filter-is-not-applied-if-certain-match-criteria-are-used-CVE-2024-39533"},{"published_at":"2024-07-11","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA75726","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Malformed-BGP-UPDATE-causes-RPD-crash-CVE-2024-39552"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82988","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-SRX-Series-If-DNS-traceoptions-are-configured-in-a-DGA-or-tunnel-detection-scenario-specific-DNS-traffic-leads-to-a-PFE-crash-CVE-2024-39529"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83017","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-MAC-table-changes-cause-a-memory-leak-CVE-2024-39557"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82983","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX-7000-Series-Multicast-traffic-is-looped-in-a-multihoming-EVPN-MPLS-scenario-CVE-2024-39519"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83020","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Memory-leak-due-to-RSVP-neighbor-persistent-error-leading-to-kernel-crash-CVE-2024-39560"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82998","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-ACX7000-Series-When-multicast-traffic-with-a-specific-S-G-is-received-evo-pfemand-crashes-CVE-2024-39538"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82999","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-MX-Series-Continuous-subscriber-logins-will-lead-to-a-memory-leak-and-eventually-an-FPC-crash-CVE-2024-39539"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA83016","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Loading-a-malicious-certificate-from-the-CLI-may-result-in-a-stack-based-overflow-CVE-2024-39556"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82992","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Confidential-information-in-logs-can-be-accessed-by-another-user-CVE-2024-39532"},{"published_at":"2024-07-10","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82978","url":"https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Execution-of-a-specific-CLI-command-will-cause-a-crash-in-the-AFT-manager-CVE-2024-39513"}]}
