高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| Juniper Networks | Junos OS | 15.1 ~ 15.1F6-S12, 15.1R7-S4 | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2019-0008 | QFX5000 Series, EX4300, EX4600: A stack buffer overflow vulnerability in Packet Forwarding | |
| CVE-2019-0019 | BGP packets can trigger rpd crash when BGP tracing is enabled. | |
| CVE-2019-0028 | Junos OS: RPD process crashes due to specific BGP peer restarts condition. | |
| CVE-2019-0031 | Junos OS: jdhcpd daemon memory consumption Denial of Service when receiving specific IPv6 | |
| CVE-2019-0032 | Junos Space Service Now and Service Insight: Organization username and password stored in | |
| CVE-2019-0033 | SRX Series: A remote attacker may cause a high CPU Denial of Service to the device when pr | |
| CVE-2019-0035 | Junos OS: 'set system ports console insecure' allows root password recovery on OAM volumes | |
| CVE-2019-0036 | Junos OS: Firewall filter terms named "internal-1" and "internal-2" being ignored | |
| CVE-2019-0037 | Junos OS: jdhcpd crash upon receipt of crafted DHCPv6 solicit message | |
| CVE-2019-0038 | SRX Series: Crafted packets destined to fxp0 management interface on SRX340/SRX345 devices | |
| CVE-2019-0039 | Junos OS: Login credentials are vulnerable to brute force attacks through the REST API | |
| CVE-2019-0041 | Junos OS: EX4300-MP Series: IP transit traffic can reach the control plane via loopback in | |
| CVE-2019-0042 | Incorrect messages from Juniper Identity Management Service (JIMS) can trigger Denial of S | |
| CVE-2019-0043 | Junos OS: RPD process crashes upon receipt of a specific SNMP packet | |
| CVE-2019-0044 | Junos OS: SRX5000 series: Kernel crash (vmcore) upon receipt of a specific packet on fxp0 |
まだコメントはありません