Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Juniper Networks | Junos OS | 12.1X46 ~ 12.1X46-D71 | - | |
| Juniper Networks | Junos OS | 14.1 ~ 14.1R9 | - | |
| Juniper Networks | Junos OS | 14.1X53 ~ 14.1X53-D40 | - | |
| Juniper Networks | Junos OS | 15.1X53 ~ 15.1X53-D232 | - | |
| Juniper Networks | Junos OS | 15.1X53 ~ 15.1X53-D49, 15.1X53-D470 | - | |
| Juniper Networks | Junos OS | 15.1X53 ~ 15.1X53-D65 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2018-0001 | Junos: Unauthenticated Remote Code Execution through J-Web interface | |
| CVE-2018-0002 | MX series, SRX series: Junos OS: Denial of service vulnerability in Flowd on devices with | |
| CVE-2018-0003 | Junos OS: A crafted MPLS packet may lead to a kernel crash | |
| CVE-2018-0004 | Junos OS: Kernel Denial of Service Vulnerability | |
| CVE-2018-0005 | Security Bulletin: Junos OS: MAC move limit configured to drop traffic may forward traffic | |
| CVE-2018-0006 | Junos OS: bbe-smgd process denial of service while processing VLAN authentication requests | |
| CVE-2018-0009 | SRX Series: Firewall bypass vulnerability when UUID with leading zeros is configured. | |
| CVE-2018-0011 | Junos Space: Reflected XSS vulnerability in Junos Space management interface | |
| CVE-2018-0012 | Junos Space: Local privilege escalation vulnerability in Junos Space | |
| CVE-2018-0013 | Junos Space: Local File Inclusion Vulnerability | |
| CVE-2018-0014 | ScreenOS: Etherleak vulnerability found on ScreenOS device |
No comments yet