Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Juniper Networks | Junos OS | 0 ~ 20.4R3-S8 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-44194 | 8.4 HIGH | Junos OS: An unauthenticated attacker with local access to the device can create a backdoo |
| CVE-2023-44199 | 7.5 HIGH | Junos OS: MX Series: In a PTP scenario a prolonged routing protocol churn can trigger an F |
| CVE-2023-36841 | 7.5 HIGH | Junos OS: MX Series: Receipt of malformed TCP traffic will cause a Denial of Service |
| CVE-2023-44197 | 7.5 HIGH | Junos OS and Junos OS Evolved: An rpd crash may occur when BGP is processing newly learned |
| CVE-2023-36843 | 7.5 HIGH | Junos OS: SRX Series: The PFE will crash on receiving malformed SSL traffic when Sky ATP i |
| CVE-2023-44181 | 7.5 HIGH | Junos OS: QFX5k: l2 loop in the overlay impacts the stability in a EVPN/VXLAN environment |
| CVE-2023-44192 | 7.5 HIGH | Junos OS: QFX5000 Series: DMA memory leak is observed when specific DHCP packets are trans |
| CVE-2023-44191 | 7.5 HIGH | Junos OS: QFX5000 Series and EX4000 Series: Denial of Service (DoS) on a large scale VLAN |
| CVE-2023-44185 | 7.5 HIGH | Junos OS and Junos OS Evolved: In an BGP scenario RPD crashes upon receiving and processin |
| CVE-2023-44182 | 7.3 HIGH | Junos OS and Junos OS Evolved: An Unchecked Return Value in multiple users interfaces affe |
| CVE-2023-22392 | 6.5 MEDIUM | Junos OS: PTX Series and QFX10000 Series: Received flow-routes which aren't installed as t |
| CVE-2023-44204 | 6.5 MEDIUM | Junos OS and Junos OS Evolved: The rpd will crash upon receiving a malformed BGP UPDATE me |
| CVE-2023-36839 | 6.5 MEDIUM | Junos OS and Junos OS Evolved: An l2cpd crash will occur when specific LLDP packets are re |
| CVE-2023-44175 | 6.5 MEDIUM | Junos OS and Junos OS Evolved: Receipt of a specific genuine PIM packet causes RPD crash |
| CVE-2023-44183 | 6.5 MEDIUM | Junos OS: QFX5000 Series, EX4600 Series: In a VxLAN scenario an adjacent attacker within t |
| CVE-2023-44184 | 6.5 MEDIUM | Junos OS and Junos OS Evolved: High CPU load due to specific NETCONF command |
| CVE-2023-44196 | 6.5 MEDIUM | Junos OS Evolved: PTX10003 Series: Packets which are not destined to the router can reach |
| CVE-2023-44203 | 6.5 MEDIUM | Junos OS: QFX5000 Series, EX2300, EX3400, EX4100, EX4400 and EX4600: Packet flooding will |
| CVE-2023-44198 | 5.8 MEDIUM | Junos OS: SRX Series and MX Series: SIP ALG doesn't drop specifically malformed retransmit |
| CVE-2023-44193 | 5.5 MEDIUM | Junos OS: MX Series: An FPC crash is observed when CFM is enabled in a VPLS scenario and a |
Showing top 20 of 25 CVEs. View all on vendor page → →
No comments yet