Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Juniper Networks | Junos OS | 12.1X46 ~ 12.1X46-D81 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2019-0016 | Junos Space: Authenticated user able to delete devices without delete device privileges | |
| CVE-2019-0030 | Juniper ATP: Password hashing uses DES and a hardcoded salt | |
| CVE-2019-0029 | Juniper ATP: Splunk credentials are in logged in clear text | |
| CVE-2019-0027 | Juniper ATP: Persistent Cross-Site Scripting vulnerability in Snort Rules configuration | |
| CVE-2019-0026 | Juniper ATP: Persistent Cross-Site Scripting vulnerability in Zone configuration | |
| CVE-2019-0025 | Juniper ATP: Persistent Cross-Site Scripting vulnerability in RADIUS configuration menu | |
| CVE-2019-0024 | Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Email Collectors menu | |
| CVE-2019-0023 | Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Golden VM menu | |
| CVE-2019-0022 | Juniper ATP: Two hard coded credentials sharing the same password give an attacker the abi | |
| CVE-2019-0021 | Juniper ATP: secret CLI inputs are logged to /var/log/syslog in clear text | |
| CVE-2019-0020 | Juniper ATP: Hard coded credentials used in Web Collector | |
| CVE-2019-0018 | Juniper ATP: Persistent Cross-Site Scripting (XSS) vulnerability in file upload menu | |
| CVE-2019-0017 | Junos Space: Unrestricted file upload vulnerability | |
| CVE-2019-0001 | Junos OS: MX Series: uncontrolled recursion and crash in Broadband Edge subscriber managem | |
| CVE-2019-0015 | Junos OS: SRX Series: Deleted dynamic VPN users are allowed to establish VPN connections u | |
| CVE-2019-0014 | Junos OS: QFX and PTX Series: FPC process crashes after J-Flow processes a malformed packe | |
| CVE-2019-0013 | Junos OS: RPD crash upon receipt of malformed PIM packet | |
| CVE-2019-0011 | Junos OS: Kernel crash after processing specific incoming packet to the out of band manage | |
| CVE-2019-0010 | Junos OS: SRX Series: Crafted HTTP traffic may cause UTM to consume all mbufs, leading to | |
| CVE-2019-0009 | Junos OS: EX2300 and EX3400: High disk I/O operations may disrupt the communication betwee |
Showing top 20 of 26 CVEs. View all on vendor page → →
No comments yet