高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| Juniper Networks | Junos OS | 14.1X53 ~ 14.1X53-D53 | - | |
| Juniper Networks | Junos OS | 16.1 ~ 16.1R7-S7 | - | |
| Juniper Networks | Junos OS | 17.1 ~ 17.1R3-S2 | - | |
| Juniper Networks | Junos OS | 17.2 ~ 17.2R3-S3 | - | |
| Juniper Networks | Junos OS | 18.1 ~ 18.1R3-S9 | - | |
| Juniper Networks | Junos OS | 18.3 ~ 18.3R1-S7, 18.3R3-S1 | - | |
| Juniper Networks | Junos OS | 19.2 ~ 19.2R1-S4, 19.2R2 | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2021-0211 | 10.0 CRITICAL | Junos OS and Junos OS Evolved: Upon receipt of a specific BGP FlowSpec message network tra |
| CVE-2021-0208 | 8.8 HIGH | Junos OS and Junos OS Evolved: In bidirectional LSP configurations, on MPLS egress router |
| CVE-2021-0203 | 8.6 HIGH | Junos OS: EX and QFX5K Series: Storm Control does not work as expected when Redundant Trun |
| CVE-2021-0204 | 7.8 HIGH | Junos OS: dexp Local Privilege Escalation vulnerabilities in SUID binaries |
| CVE-2021-0218 | 7.8 HIGH | Junos OS: Command injection vulnerability in license-check daemon |
| CVE-2021-0223 | 7.8 HIGH | Junos OS: telnetd.real Local Privilege Escalation vulnerabilities in SUID binaries |
| CVE-2021-0206 | 7.5 HIGH | Junos OS: NFX Series, SRX Series: PFE may crash upon receipt of specific packet when SSL P |
| CVE-2021-0207 | 7.5 HIGH | NFX250, NFX350, QFX5K Series, EX2300 Series, EX3400 Series, EX4300 Multigigabit, EX4600 Se |
| CVE-2021-0202 | 7.5 HIGH | Junos OS: MX Series, EX9200 Series: Trio-based MPC memory leak when Integrated Routing and |
| CVE-2021-0217 | 7.4 HIGH | Junos OS: EX Series and QFX Series: Memory leak issue processing specific DHCP packets |
| CVE-2021-0210 | 6.8 MEDIUM | Junos OS: Privilege escalation in J-Web due to arbitrary command and code execution via in |
| CVE-2021-0220 | 6.8 MEDIUM | Junos Space: Shared secrets stored in recoverable format and directly exposed through the |
| CVE-2021-0219 | 6.7 MEDIUM | Junos OS: Command injection vulnerability in 'request system software' CLI command |
| CVE-2021-0209 | 6.5 MEDIUM | Junos OS Evolved: Receipt of certain valid BGP update packets from BGP peers may cause RPD |
| CVE-2021-0215 | 6.5 MEDIUM | Junos OS: EX Series, QFX Series, SRX Branch Series, MX Series: Memory leak in packet forwa |
| CVE-2021-0221 | 6.5 MEDIUM | Junos OS: QFX Series: Traffic loop Denial of Service (DoS) upon receipt of specific IP mul |
| CVE-2021-0205 | 5.8 MEDIUM | Junos OS: MX Series: Dynamic filter fails to match IPv6 prefix |
| CVE-2021-0212 | 5.0 MEDIUM | Contrail Networking: Administrator credentials are exposed in a plaintext file |
まだコメントはありません