Session And Resource Control Juniper Networks Session And Resource Control

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Juniper Networks Session And Resource Control.

By the Year

In 2024 there have been 0 vulnerabilities in Juniper Networks Session And Resource Control . Session And Resource Control did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 3 6.57
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Session And Resource Control vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Juniper Networks Session And Resource Control Security Vulnerabilities

A configuration weakness in the JBoss Application Server (AppSvr) component of Juniper Networks SRC Series

CVE-2021-31380 5.3 - Medium - October 19, 2021

A configuration weakness in the JBoss Application Server (AppSvr) component of Juniper Networks SRC Series allows a remote attacker to send a specially crafted query to cause the web server to disclose sensitive information in the HTTP response which allows the attacker to obtain sensitive information.

An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could

CVE-2021-31352 5.3 - Medium - October 19, 2021

An Information Exposure vulnerability in Juniper Networks SRC Series devices configured for NETCONF over SSH permits the negotiation of weak ciphers, which could allow a remote attacker to obtain sensitive information. A remote attacker with read and write access to network data could exploit this vulnerability to display plaintext bits from a block of ciphertext and obtain sensitive information. This issue affects all Juniper Networks SRC Series versions prior to 4.13.0-R6.

Use of a Broken or Risky Cryptographic Algorithm

A configuration weakness in the JBoss Application Server (AppSvr) component of Juniper Networks SRC Series

CVE-2021-31381 9.1 - Critical - October 19, 2021

A configuration weakness in the JBoss Application Server (AppSvr) component of Juniper Networks SRC Series allows a remote attacker to send a specially crafted query to cause the web server to delete files which may allow the attacker to disrupt the integrity and availability of the system.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Juniper Networks Session And Resource Control or by Juniper Networks? Click the Watch button to subscribe.

subscribe