高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| Juniper Networks | JSI LWC | 0 ~ 3.0.94 | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2026-33785 | 8.8 HIGH | Junos OS: MX Series: Missing Authorization for specific 'request' CLI commands in a JDM/CS |
| CVE-2025-13914 | 8.7 HIGH | Apstra: SSH host key validation vulnerability for managed devices |
| CVE-2026-33793 | 7.8 HIGH | Junos OS and Junos OS Evolved: When an unsigned Python op script configuration is present, |
| CVE-2026-33788 | 7.8 HIGH | Junos OS Evolved: Local, authenticated attacker can gain privileged access to FPCs |
| CVE-2026-33790 | 7.5 HIGH | Junos OS: SRX Series: In a NAT64 configuration, receipt of a specific, malformed ICMPv6 pa |
| CVE-2026-33778 | 7.5 HIGH | Junos OS: SRX Series, MX Series: When a specifically malformed first ISAKMP packet is rece |
| CVE-2026-33771 | 7.4 HIGH | CTP OS: Configuring password requirements does not work which permits the use of weak pass |
| CVE-2026-33797 | 7.4 HIGH | Junos OS and Junos OS Evolved: An attacker sending a specific genuine BGP packet causes a |
| CVE-2026-21916 | 7.3 HIGH | Junos OS: A low privileged user can escalate their privileges so that they can login as ro |
| CVE-2026-33791 | 6.7 MEDIUM | Junos OS and Junos OS Evolved: Execution of crafted CLI commands allows for arbitrary shel |
| CVE-2026-21915 | 6.7 MEDIUM | JSI Virtual Lightweight Collector: Shell escape allows privilege escalation to root |
| CVE-2026-33780 | 6.5 MEDIUM | Junos OS and Junos OS Evolved: In an EVPN-MPLS scenario churn of ESI routes causes a memor |
| CVE-2025-59969 | 6.5 MEDIUM | Junos OS Evolved: QFX5000 Series and PTX Series: An attacker sending crafted multicast pac |
| CVE-2026-21919 | 6.5 MEDIUM | Junos OS and Junos OS Evolved: A high frequency of connecting and disconnecting NETCONF se |
| CVE-2026-33781 | 6.5 MEDIUM | Junos OS: EX Series, QFX Series: In a VXLAN scenario when specific control protocol packet |
| CVE-2026-33782 | 6.5 MEDIUM | Junos OS: MX Series: In specific DHCPv6 scenarios jdhcpd memory increases continuously wit |
| CVE-2026-33775 | 6.5 MEDIUM | Junos OS: MX Series: Mismatch between configured and received packet types causes memory l |
| CVE-2026-33779 | 6.5 MEDIUM | Junos OS: SRX Series: Insufficient certificate verification for device to SD cloud communi |
| CVE-2026-33783 | 6.5 MEDIUM | Junos OS Evolved: PTX Series: If SRTE tunnels provisioned via PCEP are present and specifi |
| CVE-2026-33774 | 6.5 MEDIUM | Junos OS: MX Series: Firewall filters on lo0.<non-0> in the default routing instance are n |
Showing 20 of 26 CVEs. View all on vendor page →
まだコメントはありません