高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| Cisco | Cisco IOS XE Software | n/a | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2022-20919 | 8.6 HIGH | Cisco IOS and IOS XE Software Common Industrial Protocol Request Denial of Service Vulnera |
| CVE-2022-20856 | 8.6 HIGH | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Mobility Den |
| CVE-2022-20848 | 8.6 HIGH | Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst 9100 Series Access Poi |
| CVE-2022-20855 | 7.9 HIGH | Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points Privileg |
| CVE-2022-20818 | 7.8 HIGH | Cisco SD-WAN Software Privilege Escalation Vulnerabilities |
| CVE-2022-20775 | 7.8 HIGH | Cisco SD-WAN Software Privilege Escalation Vulnerability |
| CVE-2022-20945 | 7.4 HIGH | Cisco Catalyst 9100 Series Access Points Association Request Denial of Service Vulnerabili |
| CVE-2022-20769 | 7.4 HIGH | Cisco Wireless LAN Controller AireOS Software FIPS Mode Denial of Service Vulnerability |
| CVE-2022-20930 | 6.7 MEDIUM | Cisco SD-WAN Software Arbitrary File Corruption Vulnerability |
| CVE-2022-20810 | 6.5 MEDIUM | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Information Di |
| CVE-2022-20662 | 6.1 MEDIUM | Cisco Duo for macOS Authentication Bypass Vulnerability |
| CVE-2022-20851 | 5.5 MEDIUM | Cisco IOS XE Software Web UI Command Injection Vulnerability |
| CVE-2022-20850 | 5.5 MEDIUM | Cisco SD-WAN Arbitrary File Deletion Vulnerability |
| CVE-2022-20844 | 5.3 MEDIUM | Cisco Software-Defined Application Visibility and Control on Cisco vManage Static Username |
| CVE-2022-20728 | 4.7 MEDIUM | Cisco Access Points VLAN Bypass from Native VLAN Vulnerability |
まだコメントはありません