高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| Juniper Networks | Junos OS | 0 ~ 21.4R3-S9 | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2025-52950 | 9.6 CRITICAL | Juniper Security Director: Insufficient authorization for multiple endpoints in web interf |
| CVE-2025-52954 | 7.8 HIGH | Junos OS Evolved: A low-privileged user can execute arbitrary Junos commands and modify th |
| CVE-2025-52946 | 7.5 HIGH | Junos OS and Junos OS Evolved: With traceoptions enabled, receipt of malformed AS PATH cau |
| CVE-2025-52981 | 7.5 HIGH | Junos OS: SRX Series: Sequence of specific PIM packets causes a flowd crash |
| CVE-2025-52980 | 7.5 HIGH | Junos OS: SRX300 Series: rpd will crash upon receiving a specific, valid BGP UPDATE messag |
| CVE-2025-30661 | 7.3 HIGH | Junos OS: Low-privileged user can cause script to run as root, leading to privilege escala |
| CVE-2025-52983 | 7.2 HIGH | Junos OS: After removing ssh public key authentication root can still log in |
| CVE-2025-52988 | 6.7 MEDIUM | Junos OS and Junos OS Evolved: Privilege escalation to root via CLI command 'request syste |
| CVE-2025-52953 | 6.5 MEDIUM | Junos OS and Junos OS Evolved: An unauthenticated adjacent attacker sending a valid BGP UP |
| CVE-2025-52947 | 6.5 MEDIUM | Junos OS: ACX Series: When 'hot-standby' mode is configured for an L2 circuit, interface f |
| CVE-2025-52949 | 6.5 MEDIUM | Junos OS and Junos OS Evolved: In an EVPN environment, receipt of specifically malformed B |
| CVE-2025-52955 | 6.5 MEDIUM | Junos OS and Junos OS Evolved: When jflow/sflow is configured continuous logical interface |
| CVE-2025-52952 | 6.5 MEDIUM | Junos OS: MX Series with MPC-BUILTIN, MPC 1 through MPC 9: Receipt and processing of a mal |
| CVE-2025-52964 | 6.5 MEDIUM | Junos OS and Junos OS Evolved: Receipt of a specific BGP UPDATE causes an rpd crash on dev |
| CVE-2025-52982 | 5.9 MEDIUM | Junos OS: MX Series: When specific SIP packets are processed the MS-MPC will crash |
| CVE-2025-52984 | 5.9 MEDIUM | Junos OS and Junos OS Evolved: When a static route points to a reject next-hop and a gNMI |
| CVE-2025-52948 | 5.9 MEDIUM | Junos OS: Specific unknown traffic pattern causes FPC and system to crash when packet capt |
| CVE-2025-52951 | 5.8 MEDIUM | Junos OS: IPv6 firewall filter fails to match payload-protocol |
| CVE-2025-52963 | 5.5 MEDIUM | Junos OS: A low-privileged user can disable an interface |
| CVE-2025-52986 | 5.5 MEDIUM | Junos OS and Junos OS Evolved: When RIB sharding is configured each time a show command is |
Showing 20 of 24 CVEs. View all on vendor page →
まだコメントはありません