{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Junos OS versions 24.4 ant\u00e9rieures \u00e0 24.4R2","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions  ant\u00e9rieures \u00e0 22.4R3-S8-EVO","product":{"name":"Junos OS Evolved","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 23.4 ant\u00e9rieures \u00e0 23.4R2-S5","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 23.2-EVO ant\u00e9rieures \u00e0 23.2R2-S4-EVO","product":{"name":"Junos OS Evolved","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions ant\u00e9rieures \u00e0 22.4R3-S8","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 24.2-EVO ant\u00e9rieures \u00e0 24.2R2-S2-EVO","product":{"name":"Junos OS Evolved","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 24.4-EVO ant\u00e9rieures \u00e0 24.4R2-EVO","product":{"name":"Junos OS Evolved","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos Space versions ant\u00e9rieures \u00e0 24.1R4","product":{"name":"Junos Space","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Security Director Policy Enforcer versions ant\u00e9rieures \u00e0 23.1R1 Hotpatch v3","product":{"name":"Security Director","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos Space Security Director versions ant\u00e9rieures \u00e0 24.1R4","product":{"name":"Junos Space","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS Evolved versions 23.4-EVO ant\u00e9rieures \u00e0 23.4R2-S5-EVO","product":{"name":"Junos OS Evolved","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 23.2 ant\u00e9rieures \u00e0 23.2R2-S4","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}},{"description":"Junos OS versions 24.2 ant\u00e9rieures \u00e0 24.2R2-S1","product":{"name":"Junos OS","vendor":{"name":"Juniper Networks","scada":false}}}],"affected_systems_content":"","content":"## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des correctifs (cf. section Documentation).","cves":[{"name":"CVE-2024-24795","url":"https://www.cve.org/CVERecord?id=CVE-2024-24795"},{"name":"CVE-2024-36903","url":"https://www.cve.org/CVERecord?id=CVE-2024-36903"},{"name":"CVE-2023-44431","url":"https://www.cve.org/CVERecord?id=CVE-2023-44431"},{"name":"CVE-2021-47606","url":"https://www.cve.org/CVERecord?id=CVE-2021-47606"},{"name":"CVE-2025-59993","url":"https://www.cve.org/CVERecord?id=CVE-2025-59993"},{"name":"CVE-2025-59997","url":"https://www.cve.org/CVERecord?id=CVE-2025-59997"},{"name":"CVE-2023-7104","url":"https://www.cve.org/CVERecord?id=CVE-2023-7104"},{"name":"CVE-2025-59995","url":"https://www.cve.org/CVERecord?id=CVE-2025-59995"},{"name":"CVE-2024-21235","url":"https://www.cve.org/CVERecord?id=CVE-2024-21235"},{"name":"CVE-2023-28466","url":"https://www.cve.org/CVERecord?id=CVE-2023-28466"},{"name":"CVE-2024-36921","url":"https://www.cve.org/CVERecord?id=CVE-2024-36921"},{"name":"CVE-2025-59986","url":"https://www.cve.org/CVERecord?id=CVE-2025-59986"},{"name":"CVE-2025-60009","url":"https://www.cve.org/CVERecord?id=CVE-2025-60009"},{"name":"CVE-2025-59989","url":"https://www.cve.org/CVERecord?id=CVE-2025-59989"},{"name":"CVE-2024-26897","url":"https://www.cve.org/CVERecord?id=CVE-2024-26897"},{"name":"CVE-2023-46103","url":"https://www.cve.org/CVERecord?id=CVE-2023-46103"},{"name":"CVE-2024-27052","url":"https://www.cve.org/CVERecord?id=CVE-2024-27052"},{"name":"CVE-2023-2235","url":"https://www.cve.org/CVERecord?id=CVE-2023-2235"},{"name":"CVE-2025-59999","url":"https://www.cve.org/CVERecord?id=CVE-2025-59999"},{"name":"CVE-2025-59994","url":"https://www.cve.org/CVERecord?id=CVE-2025-59994"},{"name":"CVE-2024-4076","url":"https://www.cve.org/CVERecord?id=CVE-2024-4076"},{"name":"CVE-2025-59967","url":"https://www.cve.org/CVERecord?id=CVE-2025-59967"},{"name":"CVE-2022-24805","url":"https://www.cve.org/CVERecord?id=CVE-2022-24805"},{"name":"CVE-2024-12797","url":"https://www.cve.org/CVERecord?id=CVE-2024-12797"},{"name":"CVE-2023-3390","url":"https://www.cve.org/CVERecord?id=CVE-2023-3390"},{"name":"CVE-2024-37356","url":"https://www.cve.org/CVERecord?id=CVE-2024-37356"},{"name":"CVE-2024-47538","url":"https://www.cve.org/CVERecord?id=CVE-2024-47538"},{"name":"CVE-2023-4004","url":"https://www.cve.org/CVERecord?id=CVE-2023-4004"},{"name":"CVE-2024-21823","url":"https://www.cve.org/CVERecord?id=CVE-2024-21823"},{"name":"CVE-2025-59991","url":"https://www.cve.org/CVERecord?id=CVE-2025-59991"},{"name":"CVE-2024-5564","url":"https://www.cve.org/CVERecord?id=CVE-2024-5564"},{"name":"CVE-2024-26600","url":"https://www.cve.org/CVERecord?id=CVE-2024-26600"},{"name":"CVE-2023-28746","url":"https://www.cve.org/CVERecord?id=CVE-2023-28746"},{"name":"CVE-2023-52864","url":"https://www.cve.org/CVERecord?id=CVE-2023-52864"},{"name":"CVE-2025-26600","url":"https://www.cve.org/CVERecord?id=CVE-2025-26600"},{"name":"CVE-2024-3596","url":"https://www.cve.org/CVERecord?id=CVE-2024-3596"},{"name":"CVE-2024-27280","url":"https://www.cve.org/CVERecord?id=CVE-2024-27280"},{"name":"CVE-2024-36929","url":"https://www.cve.org/CVERecord?id=CVE-2024-36929"},{"name":"CVE-2023-35788","url":"https://www.cve.org/CVERecord?id=CVE-2023-35788"},{"name":"CVE-2025-59982","url":"https://www.cve.org/CVERecord?id=CVE-2025-59982"},{"name":"CVE-2024-1975","url":"https://www.cve.org/CVERecord?id=CVE-2024-1975"},{"name":"CVE-2023-43785","url":"https://www.cve.org/CVERecord?id=CVE-2023-43785"},{"name":"CVE-2024-30205","url":"https://www.cve.org/CVERecord?id=CVE-2024-30205"},{"name":"CVE-2018-17247","url":"https://www.cve.org/CVERecord?id=CVE-2018-17247"},{"name":"CVE-2025-60004","url":"https://www.cve.org/CVERecord?id=CVE-2025-60004"},{"name":"CVE-2023-51594","url":"https://www.cve.org/CVERecord?id=CVE-2023-51594"},{"name":"CVE-2024-22025","url":"https://www.cve.org/CVERecord?id=CVE-2024-22025"},{"name":"CVE-2023-50229","url":"https://www.cve.org/CVERecord?id=CVE-2023-50229"},{"name":"CVE-2025-59974","url":"https://www.cve.org/CVERecord?id=CVE-2025-59974"},{"name":"CVE-2025-26598","url":"https://www.cve.org/CVERecord?id=CVE-2025-26598"},{"name":"CVE-2018-3824","url":"https://www.cve.org/CVERecord?id=CVE-2018-3824"},{"name":"CVE-2024-40928","url":"https://www.cve.org/CVERecord?id=CVE-2024-40928"},{"name":"CVE-2024-43398","url":"https://www.cve.org/CVERecord?id=CVE-2024-43398"},{"name":"CVE-2024-8508","url":"https://www.cve.org/CVERecord?id=CVE-2024-8508"},{"name":"CVE-2024-36020","url":"https://www.cve.org/CVERecord?id=CVE-2024-36020"},{"name":"CVE-2021-45105","url":"https://www.cve.org/CVERecord?id=CVE-2021-45105"},{"name":"CVE-2025-59981","url":"https://www.cve.org/CVERecord?id=CVE-2025-59981"},{"name":"CVE-2023-31248","url":"https://www.cve.org/CVERecord?id=CVE-2023-31248"},{"name":"CVE-2024-1737","url":"https://www.cve.org/CVERecord?id=CVE-2024-1737"},{"name":"CVE-2023-25193","url":"https://www.cve.org/CVERecord?id=CVE-2023-25193"},{"name":"CVE-2021-4104","url":"https://www.cve.org/CVERecord?id=CVE-2021-4104"},{"name":"CVE-2024-30203","url":"https://www.cve.org/CVERecord?id=CVE-2024-30203"},{"name":"CVE-2023-3090","url":"https://www.cve.org/CVERecord?id=CVE-2023-3090"},{"name":"CVE-2024-35937","url":"https://www.cve.org/CVERecord?id=CVE-2024-35937"},{"name":"CVE-2025-59968","url":"https://www.cve.org/CVERecord?id=CVE-2025-59968"},{"name":"CVE-2023-51592","url":"https://www.cve.org/CVERecord?id=CVE-2023-51592"},{"name":"CVE-2025-59990","url":"https://www.cve.org/CVERecord?id=CVE-2025-59990"},{"name":"CVE-2021-22146","url":"https://www.cve.org/CVERecord?id=CVE-2021-22146"},{"name":"CVE-2025-59978","url":"https://www.cve.org/CVERecord?id=CVE-2025-59978"},{"name":"CVE-2024-25629","url":"https://www.cve.org/CVERecord?id=CVE-2024-25629"},{"name":"CVE-2024-36017","url":"https://www.cve.org/CVERecord?id=CVE-2024-36017"},{"name":"CVE-2024-24806","url":"https://www.cve.org/CVERecord?id=CVE-2024-24806"},{"name":"CVE-2024-27434","url":"https://www.cve.org/CVERecord?id=CVE-2024-27434"},{"name":"CVE-2023-47038","url":"https://www.cve.org/CVERecord?id=CVE-2023-47038"},{"name":"CVE-2024-35852","url":"https://www.cve.org/CVERecord?id=CVE-2024-35852"},{"name":"CVE-2024-38558","url":"https://www.cve.org/CVERecord?id=CVE-2024-38558"},{"name":"CVE-2025-59992","url":"https://www.cve.org/CVERecord?id=CVE-2025-59992"},{"name":"CVE-2024-35845","url":"https://www.cve.org/CVERecord?id=CVE-2024-35845"},{"name":"CVE-2021-41072","url":"https://www.cve.org/CVERecord?id=CVE-2021-41072"},{"name":"CVE-2025-60000","url":"https://www.cve.org/CVERecord?id=CVE-2025-60000"},{"name":"CVE-2022-24807","url":"https://www.cve.org/CVERecord?id=CVE-2022-24807"},{"name":"CVE-2024-47607","url":"https://www.cve.org/CVERecord?id=CVE-2024-47607"},{"name":"CVE-2024-27065","url":"https://www.cve.org/CVERecord?id=CVE-2024-27065"},{"name":"CVE-2024-36005","url":"https://www.cve.org/CVERecord?id=CVE-2024-36005"},{"name":"CVE-2023-45866","url":"https://www.cve.org/CVERecord?id=CVE-2023-45866"},{"name":"CVE-2023-27349","url":"https://www.cve.org/CVERecord?id=CVE-2023-27349"},{"name":"CVE-2023-0464","url":"https://www.cve.org/CVERecord?id=CVE-2023-0464"},{"name":"CVE-2015-5377","url":"https://www.cve.org/CVERecord?id=CVE-2015-5377"},{"name":"CVE-2023-48161","url":"https://www.cve.org/CVERecord?id=CVE-2023-48161"},{"name":"CVE-2022-24810","url":"https://www.cve.org/CVERecord?id=CVE-2022-24810"},{"name":"CVE-2024-33621","url":"https://www.cve.org/CVERecord?id=CVE-2024-33621"},{"name":"CVE-2024-27983","url":"https://www.cve.org/CVERecord?id=CVE-2024-27983"},{"name":"CVE-2025-60001","url":"https://www.cve.org/CVERecord?id=CVE-2025-60001"},{"name":"CVE-2024-5742","url":"https://www.cve.org/CVERecord?id=CVE-2024-5742"},{"name":"CVE-2023-50230","url":"https://www.cve.org/CVERecord?id=CVE-2023-50230"},{"name":"CVE-2025-52960","url":"https://www.cve.org/CVERecord?id=CVE-2025-52960"},{"name":"CVE-2024-36922","url":"https://www.cve.org/CVERecord?id=CVE-2024-36922"},{"name":"CVE-2025-59996","url":"https://www.cve.org/CVERecord?id=CVE-2025-59996"},{"name":"CVE-2024-39487","url":"https://www.cve.org/CVERecord?id=CVE-2024-39487"},{"name":"CVE-2024-27982","url":"https://www.cve.org/CVERecord?id=CVE-2024-27982"},{"name":"CVE-2023-38575","url":"https://www.cve.org/CVERecord?id=CVE-2023-38575"},{"name":"CVE-2024-35911","url":"https://www.cve.org/CVERecord?id=CVE-2024-35911"},{"name":"CVE-2025-59957","url":"https://www.cve.org/CVERecord?id=CVE-2025-59957"},{"name":"CVE-2025-59958","url":"https://www.cve.org/CVERecord?id=CVE-2025-59958"},{"name":"CVE-2021-41043","url":"https://www.cve.org/CVERecord?id=CVE-2021-41043"},{"name":"CVE-2018-17244","url":"https://www.cve.org/CVERecord?id=CVE-2018-17244"},{"name":"CVE-2019-12900","url":"https://www.cve.org/CVERecord?id=CVE-2019-12900"},{"name":"CVE-2024-39908","url":"https://www.cve.org/CVERecord?id=CVE-2024-39908"},{"name":"CVE-2025-26597","url":"https://www.cve.org/CVERecord?id=CVE-2025-26597"},{"name":"CVE-2024-36971","url":"https://www.cve.org/CVERecord?id=CVE-2024-36971"},{"name":"CVE-2023-2603","url":"https://www.cve.org/CVERecord?id=CVE-2023-2603"},{"name":"CVE-2024-41946","url":"https://www.cve.org/CVERecord?id=CVE-2024-41946"},{"name":"CVE-2023-3776","url":"https://www.cve.org/CVERecord?id=CVE-2023-3776"},{"name":"CVE-2024-42934","url":"https://www.cve.org/CVERecord?id=CVE-2024-42934"},{"name":"CVE-2023-51580","url":"https://www.cve.org/CVERecord?id=CVE-2023-51580"},{"name":"CVE-2024-35848","url":"https://www.cve.org/CVERecord?id=CVE-2024-35848"},{"name":"CVE-2024-27417","url":"https://www.cve.org/CVERecord?id=CVE-2024-27417"},{"name":"CVE-2023-21102","url":"https://www.cve.org/CVERecord?id=CVE-2023-21102"},{"name":"CVE-2024-27281","url":"https://www.cve.org/CVERecord?id=CVE-2024-27281"},{"name":"CVE-2025-59983","url":"https://www.cve.org/CVERecord?id=CVE-2025-59983"},{"name":"CVE-2024-36941","url":"https://www.cve.org/CVERecord?id=CVE-2024-36941"},{"name":"CVE-2024-2236","url":"https://www.cve.org/CVERecord?id=CVE-2024-2236"},{"name":"CVE-2024-38428","url":"https://www.cve.org/CVERecord?id=CVE-2024-38428"},{"name":"CVE-2024-35969","url":"https://www.cve.org/CVERecord?id=CVE-2024-35969"},{"name":"CVE-2021-45046","url":"https://www.cve.org/CVERecord?id=CVE-2021-45046"},{"name":"CVE-2025-60006","url":"https://www.cve.org/CVERecord?id=CVE-2025-60006"},{"name":"CVE-2024-36489","url":"https://www.cve.org/CVERecord?id=CVE-2024-36489"},{"name":"CVE-2015-1427","url":"https://www.cve.org/CVERecord?id=CVE-2015-1427"},{"name":"CVE-2024-38575","url":"https://www.cve.org/CVERecord?id=CVE-2024-38575"},{"name":"CVE-2024-35899","url":"https://www.cve.org/CVERecord?id=CVE-2024-35899"},{"name":"CVE-2024-35823","url":"https://www.cve.org/CVERecord?id=CVE-2024-35823"},{"name":"CVE-2024-40954","url":"https://www.cve.org/CVERecord?id=CVE-2024-40954"},{"name":"CVE-2024-9632","url":"https://www.cve.org/CVERecord?id=CVE-2024-9632"},{"name":"CVE-2023-38408","url":"https://www.cve.org/CVERecord?id=CVE-2023-38408"},{"name":"CVE-2025-26595","url":"https://www.cve.org/CVERecord?id=CVE-2025-26595"},{"name":"CVE-2024-26868","url":"https://www.cve.org/CVERecord?id=CVE-2024-26868"},{"name":"CVE-2023-43787","url":"https://www.cve.org/CVERecord?id=CVE-2023-43787"},{"name":"CVE-2023-43786","url":"https://www.cve.org/CVERecord?id=CVE-2023-43786"},{"name":"CVE-2024-8235","url":"https://www.cve.org/CVERecord?id=CVE-2024-8235"},{"name":"CVE-2023-4147","url":"https://www.cve.org/CVERecord?id=CVE-2023-4147"},{"name":"CVE-2025-59977","url":"https://www.cve.org/CVERecord?id=CVE-2025-59977"},{"name":"CVE-2023-6004","url":"https://www.cve.org/CVERecord?id=CVE-2023-6004"},{"name":"CVE-2023-3610","url":"https://www.cve.org/CVERecord?id=CVE-2023-3610"},{"name":"CVE-2025-26596","url":"https://www.cve.org/CVERecord?id=CVE-2025-26596"},{"name":"CVE-2024-4603","url":"https://www.cve.org/CVERecord?id=CVE-2024-4603"},{"name":"CVE-2022-48622","url":"https://www.cve.org/CVERecord?id=CVE-2022-48622"},{"name":"CVE-2021-42550","url":"https://www.cve.org/CVERecord?id=CVE-2021-42550"},{"name":"CVE-2021-44228","url":"https://www.cve.org/CVERecord?id=CVE-2021-44228"},{"name":"CVE-2024-26828","url":"https://www.cve.org/CVERecord?id=CVE-2024-26828"},{"name":"CVE-2025-59998","url":"https://www.cve.org/CVERecord?id=CVE-2025-59998"},{"name":"CVE-2024-26808","url":"https://www.cve.org/CVERecord?id=CVE-2024-26808"},{"name":"CVE-2024-30204","url":"https://www.cve.org/CVERecord?id=CVE-2024-30204"},{"name":"CVE-2025-60002","url":"https://www.cve.org/CVERecord?id=CVE-2025-60002"},{"name":"CVE-2023-35001","url":"https://www.cve.org/CVERecord?id=CVE-2023-35001"},{"name":"CVE-2024-27282","url":"https://www.cve.org/CVERecord?id=CVE-2024-27282"},{"name":"CVE-2018-3831","url":"https://www.cve.org/CVERecord?id=CVE-2018-3831"},{"name":"CVE-2023-43490","url":"https://www.cve.org/CVERecord?id=CVE-2023-43490"},{"name":"CVE-2025-59976","url":"https://www.cve.org/CVERecord?id=CVE-2025-59976"},{"name":"CVE-2025-59980","url":"https://www.cve.org/CVERecord?id=CVE-2025-59980"},{"name":"CVE-2025-26599","url":"https://www.cve.org/CVERecord?id=CVE-2025-26599"},{"name":"CVE-2024-47615","url":"https://www.cve.org/CVERecord?id=CVE-2024-47615"},{"name":"CVE-2018-3823","url":"https://www.cve.org/CVERecord?id=CVE-2018-3823"},{"name":"CVE-2023-22655","url":"https://www.cve.org/CVERecord?id=CVE-2023-22655"},{"name":"CVE-2024-6126","url":"https://www.cve.org/CVERecord?id=CVE-2024-6126"},{"name":"CVE-2023-4911","url":"https://www.cve.org/CVERecord?id=CVE-2023-4911"},{"name":"CVE-2023-39368","url":"https://www.cve.org/CVERecord?id=CVE-2023-39368"},{"name":"CVE-2021-44832","url":"https://www.cve.org/CVERecord?id=CVE-2021-44832"},{"name":"CVE-2024-26853","url":"https://www.cve.org/CVERecord?id=CVE-2024-26853"},{"name":"CVE-2025-59975","url":"https://www.cve.org/CVERecord?id=CVE-2025-59975"},{"name":"CVE-2025-0624","url":"https://www.cve.org/CVERecord?id=CVE-2025-0624"},{"name":"CVE-2025-59987","url":"https://www.cve.org/CVERecord?id=CVE-2025-59987"},{"name":"CVE-2024-40958","url":"https://www.cve.org/CVERecord?id=CVE-2024-40958"},{"name":"CVE-2018-3826","url":"https://www.cve.org/CVERecord?id=CVE-2018-3826"},{"name":"CVE-2025-26601","url":"https://www.cve.org/CVERecord?id=CVE-2025-26601"},{"name":"CVE-2024-52337","url":"https://www.cve.org/CVERecord?id=CVE-2024-52337"},{"name":"CVE-2025-59985","url":"https://www.cve.org/CVERecord?id=CVE-2025-59985"},{"name":"CVE-2025-11198","url":"https://www.cve.org/CVERecord?id=CVE-2025-11198"},{"name":"CVE-2022-24806","url":"https://www.cve.org/CVERecord?id=CVE-2022-24806"},{"name":"CVE-2023-32233","url":"https://www.cve.org/CVERecord?id=CVE-2023-32233"},{"name":"CVE-2024-35789","url":"https://www.cve.org/CVERecord?id=CVE-2024-35789"},{"name":"CVE-2024-26327","url":"https://www.cve.org/CVERecord?id=CVE-2024-26327"},{"name":"CVE-2015-3253","url":"https://www.cve.org/CVERecord?id=CVE-2015-3253"},{"name":"CVE-2025-59964","url":"https://www.cve.org/CVERecord?id=CVE-2025-59964"},{"name":"CVE-2025-59988","url":"https://www.cve.org/CVERecord?id=CVE-2025-59988"},{"name":"CVE-2024-21210","url":"https://www.cve.org/CVERecord?id=CVE-2024-21210"},{"name":"CVE-2024-2511","url":"https://www.cve.org/CVERecord?id=CVE-2024-2511"},{"name":"CVE-2024-34397","url":"https://www.cve.org/CVERecord?id=CVE-2024-34397"},{"name":"CVE-2023-45733","url":"https://www.cve.org/CVERecord?id=CVE-2023-45733"},{"name":"CVE-2021-40153","url":"https://www.cve.org/CVERecord?id=CVE-2021-40153"},{"name":"CVE-2024-6655","url":"https://www.cve.org/CVERecord?id=CVE-2024-6655"},{"name":"CVE-2024-41123","url":"https://www.cve.org/CVERecord?id=CVE-2024-41123"},{"name":"CVE-2024-27049","url":"https://www.cve.org/CVERecord?id=CVE-2024-27049"},{"name":"CVE-2025-59984","url":"https://www.cve.org/CVERecord?id=CVE-2025-59984"},{"name":"CVE-2025-52961","url":"https://www.cve.org/CVERecord?id=CVE-2025-52961"},{"name":"CVE-2023-51589","url":"https://www.cve.org/CVERecord?id=CVE-2023-51589"},{"name":"CVE-2024-21217","url":"https://www.cve.org/CVERecord?id=CVE-2024-21217"},{"name":"CVE-2024-28182","url":"https://www.cve.org/CVERecord?id=CVE-2024-28182"},{"name":"CVE-2021-3903","url":"https://www.cve.org/CVERecord?id=CVE-2021-3903"},{"name":"CVE-2024-35800","url":"https://www.cve.org/CVERecord?id=CVE-2024-35800"},{"name":"CVE-2023-2124","url":"https://www.cve.org/CVERecord?id=CVE-2023-2124"},{"name":"CVE-2023-51596","url":"https://www.cve.org/CVERecord?id=CVE-2023-51596"},{"name":"CVE-2025-60010","url":"https://www.cve.org/CVERecord?id=CVE-2025-60010"},{"name":"CVE-2023-51764","url":"https://www.cve.org/CVERecord?id=CVE-2023-51764"},{"name":"CVE-2025-26594","url":"https://www.cve.org/CVERecord?id=CVE-2025-26594"},{"name":"CVE-2024-6409","url":"https://www.cve.org/CVERecord?id=CVE-2024-6409"},{"name":"CVE-2024-49761","url":"https://www.cve.org/CVERecord?id=CVE-2024-49761"},{"name":"CVE-2022-24808","url":"https://www.cve.org/CVERecord?id=CVE-2022-24808"},{"name":"CVE-2025-59962","url":"https://www.cve.org/CVERecord?id=CVE-2025-59962"},{"name":"CVE-2024-21208","url":"https://www.cve.org/CVERecord?id=CVE-2024-21208"},{"name":"CVE-2020-11023","url":"https://www.cve.org/CVERecord?id=CVE-2020-11023"},{"name":"CVE-2024-40961","url":"https://www.cve.org/CVERecord?id=CVE-2024-40961"}],"links":[],"reference":"CERTFR-2025-AVI-0855","revisions":[{"description":"Version initiale","revision_date":"2025-10-09T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Injection de code indirecte \u00e0 distance (XSS)"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d'entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks","vendor_advisories":[{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103140","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Multiple-XSS-vulnerabilities-resolved-in-24-1R4-release"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103141","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R4-release"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103163","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-Multiple-OS-command-injection-vulnerabilities-fixed-CVE-2025-60006"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103168","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Device-allows-login-for-user-with-expired-password-CVE-2025-60010"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103171","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Reflected-client-side-HTTP-parameter-pollution-vulnerability-in-web-interface-CVE-2025-59977"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103167","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-When-a-user-with-the-name-ftp-or-anonymous-is-configured-unauthenticated-filesystem-access-is-allowed-CVE-2025-59980"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103156","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-ACX7024-ACX7024X-ACX7100-32C-ACX7100-48L-ACX7348-ACX7509-When-specific-valid-multicast-traffic-is-received-on-the-L3-interface-a-vulnerable-device-evo-pfemand-crashes-and-restarts-CVE-2025-59967"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103437","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Security-Director-Policy-Enforcer-An-unrestricted-API-allows-a-network-based-unauthenticated-attacker-to-deploy-malicious-vSRX-images-to-VMWare-NSX-Server-CVE-2025-11198"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103172","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Flooding-device-with-inbound-API-calls-leads-to-WebUI-and-CLI-management-access-DoS-CVE-2025-59975"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103157","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Juniper-Security-Director-Insufficient-authorization-for-sensitive-resources-in-web-interface-CVE-2025-59968"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103170","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Arbitrary-file-download-vulnerability-in-web-interface-CVE-2025-59976"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103139","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Security-Director-Multiple-vulnerabilities-resolved-in-24-1R4"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103151","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-With-BGP-sharding-enabled-change-in-indirect-next-hop-can-cause-RPD-crash-CVE-2025-59962"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103153","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-SRX4700-When-forwarding-options-sampling-is-enabled-any-traffic-destined-to-the-RE-will-cause-the-forwarding-line-card-to-crash-and-restart-CVE-2025-59964"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103147","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-When-firewall-filter-rejects-traffic-these-packets-are-erroneously-sent-to-the-RE-CVE-2025-59958"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103144","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-Evolved-PTX-Series-except-PTX10003-An-unauthenticated-adjacent-attacker-sending-specific-valid-traffic-can-cause-a-memory-leak-in-cfmman-leading-to-FPC-crash-and-restart-CVE-2025-52961"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103143","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Receipt-of-specific-SIP-packets-in-a-high-utilization-situation-causes-a-flowd-crash-CVE-2025-52960"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103146","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-EX4600-Series-and-QFX5000-Series-An-attacker-with-physical-access-can-open-a-persistent-backdoor-CVE-2025-59957"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103138","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-Space-Security-Director-Multiple-vulnerabilities-resolved-in-24-1R4-by-upgrading-Log4j-Java-library-to-2-23-1-and-ElasticSearch-to-6-8-17"},{"published_at":"2025-10-08","title":"Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA103165","url":"https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Specific-BGP-EVPN-update-message-causes-rpd-crash-CVE-2025-60004"}]}
