Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2018-0014
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
ScreenOS: Etherleak vulnerability found on ScreenOS device
Source: NVD (National Vulnerability Database)
Vulnerability Description
Juniper Networks ScreenOS devices do not pad Ethernet packets with zeros, and thus some packets can contain fragments of system memory or data from previous packets. This issue is often detected as CVE-2003-0001. The issue affects all versions of Juniper Networks ScreenOS prior to 6.3.0r25.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Juniper ScreenOS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Juniper ScreenOS是美国瞻博网络(Juniper Networks)公司的一套运行于NetScreen系列防火墙中的操作系统。 Juniper ScreenOS 6.3.0r25版本中存在安全漏洞,该漏洞源于程序没有将Ethernet数据包填充为零。攻击者可利用该漏洞获取之前数据包中的系统内存或数据片段。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Juniper NetworksScreenOS all ~ 6.3.0r25 -
II. Public POCs for CVE-2018-0014
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2018-0014
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2018-0014

No comments yet


Leave a comment