A http cve poc framework
Gluttony Gluttony是一个http cve poc框架,使用它可以快速检测内网cve。 1安装 go get githubcom/elon996/gluttony 2用法 检测19216811的thinkphp漏洞 p参数可以是文件或者文件夹 gluttony scan -u 19216811 -p cve-2018-10225yaml gluttony scan -u 19216811 -p cve
A vulnerability in Juniper Networks Junos OS allows an malicious user to cause a Denial of Service (DoS) to the device by sending certain crafted protocol packets from an adjacent device with invalid payloads to the device. These crafted packets, which should be discarded, are instead replicated and sent to the RE. Over time, a Denial of Service (DoS) occurs. Continued receipt of these crafted protocol packets will cause an extended Denial of Service (DoS) condition, which may cause wider traffic impact due to protocol flapping. An indication of compromise is to check "monitor interface traffic" on the ingress and egress port packet counts. For each ingress packet, two duplicate packets are seen on egress. This issue can be triggered by IPv4 and IPv6 packets. This issue affects all traffic through the device. This issue affects: Juniper Networks Junos OS: 14.1X53 versions before 14.1X53-D53 on EX4300, QFX3500, QFX5100, EX4600; 15.1 versions before 15.1R7-S6 on EX4300, QFX3500, QFX5100, EX4600; 16.1 versions before 16.1R7-S7 on EX4300, QFX5100, EX4600; 17.1 versions before 17.1R2-S11 on EX4300, QFX5100, EX4600; 17.1 versions before 117.1R3-S2 on EX4300; 17.2 versions before 17.2R1-S9 on EX4300; 17.2 versions before 17.2R3-S3 on EX4300, QFX5100, EX4600, QFX5110, QFX5200; 17.3 versions before 17.3R2-S5, 17.3R3-S7 on EX4300, QFX5100, EX4600, QFX5110, QFX5200; 17.4 versions before 17.4R2-S9, 17.4R3 on EX4300, QFX5100, EX4600, QFX5110, QFX5200; 18.1 versions before 18.1R3-S9 on EX4300, QFX5100, EX4600, QFX5110, QFX5200, QFX5210, EX2300, EX3400; 18.2 versions before 18.2R2-S7 on EX4300; 18.2 versions before 18.2R3-S3 on EX4300, QFX5100, EX4600, QFX5110, QFX5200, QFX5210, EX2300, EX3400; 18.3 versions before 18.3R2-S3, on EX4300; 18.3 versions before 18.3R1-S7, 18.3R3-S1 on EX4300, QFX5100, EX4600, QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400; 18.4 versions before 18.4R1-S5, 18.4R2-S3, 18.4R3 on EX4300, QFX5100, EX4600, QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400; 19.1 versions before 19.1R1-S4, 19.1R2-S1, 19.1R3 on EX4300, QFX5100, EX4600, QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400; 19.2 versions before 19.2R1-S4, 19.2R2 on EX4300; 19.2 versions before 19.2R1-S3, 19.2R2 on QFX5100, EX4600, QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400; 19.3 versions before 19.3R2-S1, 19.3R3 on EX4300; 19.3 versions before 19.3R1-S1, 19.3R2, 19.3R3 on QFX5100, EX4600, QFX5110, QFX5200, QFX5210, QFX5120, EX4650, EX2300, EX3400;
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
juniper junos 14.1x53 |
||
juniper junos 15.1 |
||
juniper junos 16.1 |
||
juniper junos 17.1 |
||
juniper junos 17.2 |
||
juniper junos 18.2 |
||
juniper junos 18.3 |
||
juniper junos 19.2 |
||
juniper junos 19.3 |
||
juniper junos 17.3 |
||
juniper junos 17.4 |
||
juniper junos 18.1 |
||
juniper junos 18.4 |
||
juniper junos 19.1 |