All the vulnerabilites related to netscreen - netscreen-sa_5000_series
Vulnerability from fkie_nvd
Published
2004-11-23 05:00
Modified
2024-11-20 23:48
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in delhomepage.cgi in NetScreen-SA 5000 Series running firmware 3.3 Patch 1 (build 4797) allows remote authenticated users to execute arbitrary script as other users via the row parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
netscreen | netscreen-sa_5000_series | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:netscreen:netscreen-sa_5000_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA34EB36-E5E9-43B6-ABB8-B292BC7B0CBA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in delhomepage.cgi in NetScreen-SA 5000 Series running firmware 3.3 Patch 1 (build 4797) allows remote authenticated users to execute arbitrary script as other users via the row parameter." } ], "id": "CVE-2004-0347", "lastModified": "2024-11-20T23:48:22.727", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-11-23T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018120.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=107826362024112\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=107850564102190\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/114070" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/9791" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15368" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018120.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=107826362024112\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=107850564102190\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/114070" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/9791" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15368" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-08-23 04:00
Modified
2024-11-21 00:00
Severity ?
Summary
Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A037FAA6-6D26-4496-BC67-03475B4D1155", "vulnerable": true }, { "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D3831DD3-E783-4200-8986-FDBF7DD9BA53", "vulnerable": true }, { "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "2909C9D5-3D8F-4C41-B0E7-A0C0B432C19A", "vulnerable": true }, { "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "E09436DF-E3C1-4C03-A3BE-73C4BC84BB7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "699764B6-0F86-4AB0-86A3-4F2E69AD820C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "24BB54A7-24D0-409E-8924-D212543E4AAE", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.64:*:*:*:*:*:*:*", "matchCriteriaId": "74187E80-0EDA-4FE7-A113-FCB723AF08B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.66:*:*:*:*:*:*:*", "matchCriteriaId": "0D6691BE-2591-495A-BB72-2DA9956944A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.66_r2:*:*:*:*:*:*:*", "matchCriteriaId": "CAB79FD3-29CB-4694-9A67-C6AF2EADA89D", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.73_r1:*:*:*:*:*:*:*", "matchCriteriaId": "92455F85-9BFA-4684-9A6D-0E52AFA7161B", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.73_r2:*:*:*:*:*:*:*", "matchCriteriaId": "1173EA59-AEAE-49E6-B6DD-775B28C678D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.0.1_r8:*:*:*:*:*:*:*", "matchCriteriaId": "6711CD61-E16E-41B8-8948-592171D73B5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "CAD0131A-D07C-4B23-8CEC-E7CF659DB55E", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.1_r6:*:*:*:*:*:*:*", "matchCriteriaId": "2837DDC0-9F2C-4782-AA1E-5315AB12528F", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.1_r7:*:*:*:*:*:*:*", "matchCriteriaId": "07B065C9-93C6-43EB-ADD1-532FC6FBEA87", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "4D38841C-DF2D-41D8-BD15-EBBB9E9D83E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5r1:*:*:*:*:*:*:*", "matchCriteriaId": "DDDBDBE1-E16B-4F03-9072-8B28E9467FED", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5r2:*:*:*:*:*:*:*", "matchCriteriaId": "4E099835-7C70-44F1-9E2B-07AF5B3C0577", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5r6:*:*:*:*:*:*:*", "matchCriteriaId": "D10CDE09-1896-4E99-B2A0-93F89164225A", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F3159CA4-0944-4419-9B60-E93269710377", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "2F43896A-2EF6-4069-8B81-815E4C232C0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r1:*:*:*:*:*:*:*", "matchCriteriaId": "6A7DFAB9-4D4D-4179-9DC4-F654D6E2DAB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r2:*:*:*:*:*:*:*", "matchCriteriaId": "26EC0CE2-5A5C-44ED-A423-CC20B7FFE22F", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r3:*:*:*:*:*:*:*", "matchCriteriaId": "E2BD48EE-C23B-412C-895D-F58CD81FC673", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r4:*:*:*:*:*:*:*", "matchCriteriaId": "D7A6CA51-F121-44F7-80D1-CF38261D299C", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r5:*:*:*:*:*:*:*", "matchCriteriaId": "B5064E9A-677E-418E-91A7-2DB686B662DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r6:*:*:*:*:*:*:*", "matchCriteriaId": "DB00325B-29C6-41DA-9274-C9B4C54BC53E", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r7:*:*:*:*:*:*:*", "matchCriteriaId": "8DF67517-638C-4D57-8402-F336A74C4BB8", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r8:*:*:*:*:*:*:*", "matchCriteriaId": "07AC301B-0487-4FDB-B1F8-B225099B96FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r9:*:*:*:*:*:*:*", "matchCriteriaId": "A7CE0BC3-6B59-4EAB-A2BD-CF73B3BD415F", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r10:*:*:*:*:*:*:*", "matchCriteriaId": "B9B65997-2AB7-42D1-A1D9-E999A33366CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r11:*:*:*:*:*:*:*", "matchCriteriaId": "BB3F1262-141B-48E0-8EAC-97B043EBD9FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r12:*:*:*:*:*:*:*", "matchCriteriaId": "214DA9E7-E8E5-4579-86E8-A5A8BC887860", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "1CE7F646-B716-47D7-84E8-CA875A85C983", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r1:*:*:*:*:*:*:*", "matchCriteriaId": "AA96638D-AD5F-4EFD-983B-181DCCF3EAE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r2:*:*:*:*:*:*:*", "matchCriteriaId": "2E30F9B6-24EB-44FB-9E73-5DD480A48CB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r3:*:*:*:*:*:*:*", "matchCriteriaId": "B1648D07-823B-4BF9-87EC-DB34797B5B5C", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "2D06FC50-39AE-4988-8C96-38A991CD7F97", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.8_r1:*:*:*:*:*:*:*", "matchCriteriaId": "B33B8346-B753-443F-BB24-74FF6C55340B", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r3:*:*:*:*:*:*:*", "matchCriteriaId": "47DE8E73-0F1B-42E4-9BD6-7F5066D7330B", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r4:*:*:*:*:*:*:*", "matchCriteriaId": "057B0387-44C0-45BE-9D91-D5A01C9D8020", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "28EB52A7-E8EC-46AA-A3F5-81BFA01666D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r1:*:*:*:*:*:*:*", "matchCriteriaId": "A25881AB-69D0-46E5-A502-C65933A457B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r2:*:*:*:*:*:*:*", "matchCriteriaId": "B14314AE-812D-4654-B6CE-43917A1F0542", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r3:*:*:*:*:*:*:*", "matchCriteriaId": "20F7E636-40E0-45CC-A39E-C8BDF9CFBE6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r4:*:*:*:*:*:*:*", "matchCriteriaId": "463EC9BA-B241-45D6-AB89-53EB8156E40F", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "179C18B1-3731-4DBC-A942-D810671401BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r1:*:*:*:*:*:*:*", "matchCriteriaId": "D53868A9-67B6-40AD-B4F0-6911F1D2FC6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r2:*:*:*:*:*:*:*", "matchCriteriaId": "8AA52D22-A0D6-413A-9F49-0452356D2BE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r3:*:*:*:*:*:*:*", "matchCriteriaId": "02BF2DCD-4F61-4FA2-B82B-FB9DEB33054F", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r4:*:*:*:*:*:*:*", "matchCriteriaId": "1C844B2C-26BB-460D-A36E-B74F45169F46", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r5:*:*:*:*:*:*:*", "matchCriteriaId": "93F618F5-E695-41BA-BFDB-E63A9A422F74", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r6:*:*:*:*:*:*:*", "matchCriteriaId": "31811D82-B28F-49CD-8C86-A4DE7CD95F31", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r7:*:*:*:*:*:*:*", "matchCriteriaId": "56D1957D-9F30-4D66-BA14-8015E260C076", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E9FCB548-2488-4EBC-AA21-4A57F5F87E41", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "2A4C0FC0-AB52-498B-84AE-DF2C380B079D", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3_r1.1:*:*:*:*:*:*:*", "matchCriteriaId": "05578911-51E3-447B-98B6-083D3F35E8F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r1:*:*:*:*:*:*:*", "matchCriteriaId": "6D71F4A5-7380-4E0E-9B81-7CCBECA3EFF0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r2:*:*:*:*:*:*:*", "matchCriteriaId": "981D2274-9686-4F6F-83B1-F4D0DA909983", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r3:*:*:*:*:*:*:*", "matchCriteriaId": "A5CD9C77-891A-4E0D-9D5D-214466699044", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r4:*:*:*:*:*:*:*", "matchCriteriaId": "F27C7E28-915C-4ECC-A9BC-779F70905614", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r5:*:*:*:*:*:*:*", "matchCriteriaId": "47206DFC-7840-4CB8-8ED4-2212C287B4DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r6:*:*:*:*:*:*:*", "matchCriteriaId": "A46904E1-F2E5-45BA-8945-4FB3EF34D299", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r7:*:*:*:*:*:*:*", "matchCriteriaId": "45551432-C02B-426D-89DC-16573A7C8CD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r8:*:*:*:*:*:*:*", "matchCriteriaId": "CBCFE4A9-9018-4F21-8BB4-D12AD0C33690", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5BFC9DEB-00D5-4FC9-A608-1F7364FF21F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r1:*:*:*:*:*:*:*", "matchCriteriaId": "EDBA6417-9C4C-41D9-91C7-96C255EB2298", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r2:*:*:*:*:*:*:*", "matchCriteriaId": "F7C65E89-186B-4D14-8A40-58B780731DF2", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r3:*:*:*:*:*:*:*", "matchCriteriaId": "26637853-7036-434E-A9AC-AAC88D84D826", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r4:*:*:*:*:*:*:*", "matchCriteriaId": "5A890FC9-CF8B-413A-A580-2F59A42D1744", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r5:*:*:*:*:*:*:*", "matchCriteriaId": "F555CCA2-95D0-4D11-A182-5A00A03403D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r6:*:*:*:*:*:*:*", "matchCriteriaId": "A4B50AC2-39DE-4446-A9ED-0627C4A9DC21", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r7:*:*:*:*:*:*:*", "matchCriteriaId": "F01ED64F-5617-412D-807D-7FAF0E45172F", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r8:*:*:*:*:*:*:*", "matchCriteriaId": "50B215E3-FDB1-43C6-9A7E-A98F381CB311", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r9:*:*:*:*:*:*:*", "matchCriteriaId": "058331CE-8DCF-4B8D-83F5-F23D935D9931", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r10:*:*:*:*:*:*:*", "matchCriteriaId": "98D3D6B3-7BB7-40AC-8FB3-F8362DA36047", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r11:*:*:*:*:*:*:*", "matchCriteriaId": "7C2E0233-3161-4B45-9EB2-D46BE76E1520", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r12:*:*:*:*:*:*:*", "matchCriteriaId": "12B61290-20EC-4D3C-A7BF-85545F5BA5BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.1_r2:*:*:*:*:*:*:*", "matchCriteriaId": "A85A76EC-8F86-47A6-A85A-8B4216C99142", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "26958BB3-1484-42EC-AC3A-33A748B377F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:dial:*:*:*:*:*", "matchCriteriaId": "6AB0B6EE-BEDE-46AD-859E-9601297B0217", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r1:*:*:*:*:*:*:*", "matchCriteriaId": "E9E29D5B-872A-4CD5-9A44-EBFA5A7C7554", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r2:*:*:*:*:*:*:*", "matchCriteriaId": "BE3851B7-72BC-4DDF-A718-69068128CA15", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r3:*:*:*:*:*:*:*", "matchCriteriaId": "19A6D877-DF7D-4E9B-8855-2ACF97C5FC29", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r4:*:*:*:*:*:*:*", "matchCriteriaId": "54FBDD05-CAA6-4034-8C2D-94E965BE2132", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r5:*:*:*:*:*:*:*", "matchCriteriaId": "7BD1CFF3-3211-43E2-858C-37142EE54490", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r6:*:*:*:*:*:*:*", "matchCriteriaId": "9BC0306C-FDDD-4B5F-B371-17CA2231C63A", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r7:*:*:*:*:*:*:*", "matchCriteriaId": "63E607F4-E348-4385-9C2C-558BB0402585", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r8:*:*:*:*:*:*:*", "matchCriteriaId": "35CA445F-428A-4EDB-A18A-5E626D0E04BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r9:*:*:*:*:*:*:*", "matchCriteriaId": "9E8885D9-20A0-443D-9650-912F360C9B14", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r10:*:*:*:*:*:*:*", "matchCriteriaId": "4FD70CC4-334A-4734-97DE-C31A6C2014AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r11:*:*:*:*:*:*:*", "matchCriteriaId": "AC456F90-05EB-4C88-9650-ED71A35A80C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r12:*:*:*:*:*:*:*", "matchCriteriaId": "FAEA92AE-A047-4A20-A209-B9CAC646BFC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "78FF0914-F907-41F4-9F2D-6ECD601C73C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r1:*:*:*:*:*:*:*", "matchCriteriaId": "48518416-3F00-4174-A0EF-57E5A614F8A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r2:*:*:*:*:*:*:*", "matchCriteriaId": "ACCD6F2D-642E-407E-A16D-73B97F709431", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r3:*:*:*:*:*:*:*", "matchCriteriaId": "438438F8-C7C3-427A-B7AA-1E7F8DA5C014", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r4:*:*:*:*:*:*:*", "matchCriteriaId": "ED08E19A-67ED-47F9-B40F-B8CFF496AF7C", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r5:*:*:*:*:*:*:*", "matchCriteriaId": "FB9021FD-198B-4D7D-BAF3-D83EC3D64EFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r6:*:*:*:*:*:*:*", "matchCriteriaId": "01E861C0-AF82-4F7C-A515-005083D7D699", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r7:*:*:*:*:*:*:*", "matchCriteriaId": "38B7AEE2-BAA4-4FDA-A627-F5A7370D2C5E", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r8:*:*:*:*:*:*:*", "matchCriteriaId": "3BCB5149-8C43-42A2-A9B2-541802FBE5B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r9:*:*:*:*:*:*:*", "matchCriteriaId": "2C3A3552-2D77-494E-902E-9529AA2074D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r10:*:*:*:*:*:*:*", "matchCriteriaId": "BD90D085-60F7-4B3F-8C82-B9F362EFFB89", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "627A41F5-BE3C-41AD-B455-0D73BE5CA010", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7D41144E-9F64-4919-87DA-09092AA2030A", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r1:*:*:*:*:*:*:*", "matchCriteriaId": "F85BBA70-D185-4A84-8D66-2D3ACE336C6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r2:*:*:*:*:*:*:*", "matchCriteriaId": "D0F6E761-1941-4B9F-98DC-1EED40B851A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r3:*:*:*:*:*:*:*", "matchCriteriaId": "3A3720A8-B042-4366-A4F2-2262CDD0CAF9", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r4:*:*:*:*:*:*:*", "matchCriteriaId": "66AEC6EE-F483-4156-91DB-E939B45D09E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F4B1021-40CB-4A11-9650-F1BDBD6943D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "19172BCC-BFF0-4031-8AFE-B63422731B17", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0r3a:*:*:*:*:*:*:*", "matchCriteriaId": "3ACCBC8E-7C9E-4C3A-8A0F-BBF4E2F92AD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "98471F46-A271-4B0A-89A9-12D544474393", "vulnerable": true }, { "criteria": "cpe:2.3:o:netscreen:ns-10:*:*:*:*:*:*:*:*", "matchCriteriaId": "8FDFE9E5-AA71-4D17-886A-E0B493B4B833", "vulnerable": true }, { "criteria": "cpe:2.3:o:netscreen:ns-100:3.0_.pe1.0:*:*:*:*:*:*:*", "matchCriteriaId": "27E6687D-08CF-48AC-8112-555149E57B45", "vulnerable": true }, { "criteria": "cpe:2.3:o:netscreen:ns-204:5.0.0_r6.0:*:*:*:*:*:*:*", "matchCriteriaId": "04797E9E-60CB-40B3-BE23-6051C72A43D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:netscreen:ns-204:0110.0_11_4.0_r10.0:*:*:*:*:*:*:*", "matchCriteriaId": "871B28F0-C082-4AD1-A4DE-22B3DC00E6BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:netscreen:ns-204:0110.0_11_5.1.0_r3a:*:*:*:*:*:*:*", "matchCriteriaId": "1AEABCBA-45BD-45B0-9343-68178FDCB493", "vulnerable": true }, { "criteria": "cpe:2.3:o:netscreen:ns-500:4110.0_11_4.0_r10.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0F057D3-1ECB-4804-8C83-9277EFD4C322", "vulnerable": true }, { "criteria": "cpe:2.3:o:netscreen:ns-500:4110.0_11_5.1.0_r3a:*:*:*:*:*:*:*", "matchCriteriaId": "6D551820-CF22-4F80-A2A6-223D9CE63444", "vulnerable": true }, { "criteria": "cpe:2.3:o:netscreen:ns-50ns25:5.0.0_r6.0:*:*:*:*:*:*:*", "matchCriteriaId": "877DF54F-752E-4FBC-8E00-7F5FD3AE63E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:juniper:netscreen-5gt:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A482DFA5-4108-4B0F-BD8E-04FEB52D3537", "vulnerable": true }, { "criteria": "cpe:2.3:h:juniper:netscreen-idp:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "3B97B63E-CE45-4DF9-9838-D9CE96CECE72", "vulnerable": true }, { "criteria": "cpe:2.3:h:juniper:netscreen-idp:3.0r1:*:*:*:*:*:*:*", "matchCriteriaId": "EE5F6D51-15B0-449D-9418-8C4C7A1E1D7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:juniper:netscreen-idp:3.0r2:*:*:*:*:*:*:*", "matchCriteriaId": "C696E607-0927-4087-A437-9C5459EB8BE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:juniper:netscreen-idp_10:3.0.1_r1:*:*:*:*:*:*:*", "matchCriteriaId": "142A3E18-3E20-415E-A53C-01E1C8865300", "vulnerable": true }, { "criteria": "cpe:2.3:h:juniper:netscreen-idp_100:3.0.1_r1:*:*:*:*:*:*:*", "matchCriteriaId": "957172A3-6B8A-48E1-911F-28A6F055FB41", "vulnerable": true }, { "criteria": "cpe:2.3:h:juniper:netscreen-idp_1000:3.0.1_r1:*:*:*:*:*:*:*", "matchCriteriaId": "95A9B902-09D4-4A29-9BA7-FD7898B24ECC", "vulnerable": true }, { "criteria": "cpe:2.3:h:juniper:netscreen-idp_500:3.0.1_r1:*:*:*:*:*:*:*", "matchCriteriaId": "214A7AFF-B36F-4ABC-8C7D-93B1493ADEB5", "vulnerable": true }, { "criteria": "cpe:2.3:h:netscreen:netscreen-sa_5000_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA34EB36-E5E9-43B6-ABB8-B292BC7B0CBA", "vulnerable": true }, { "criteria": "cpe:2.3:h:netscreen:netscreen-sa_5020_series:4.2_r2.2:*:*:*:*:*:*:*", "matchCriteriaId": "56B26742-2B48-4D2A-8AA3-9E86ED482424", "vulnerable": true }, { "criteria": "cpe:2.3:h:netscreen:netscreen-sa_5050_series:4.2_r2.2:*:*:*:*:*:*:*", "matchCriteriaId": "6B9103D8-B207-4622-AA6C-8D58EB36688E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid." } ], "id": "CVE-2005-2640", "lastModified": "2024-11-21T00:00:02.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-08-23T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/16474/" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1014728" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/14595" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/16474/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1014728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/14595" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2005-2640
Vulnerability from cvelistv5
Published
2005-08-20 04:00
Modified
2024-08-07 22:45
Severity ?
EPSS score ?
Summary
Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/14595 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=bugtraq&m=112438068426034&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm | x_refsource_MISC | |
http://securitytracker.com/id?1014728 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/16474/ | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:45:01.317Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "14595", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14595" }, { "name": "20050818 Juniper Netscreen VPN Username Enumeration Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm" }, { "name": "1014728", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014728" }, { "name": "16474", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16474/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-08-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "14595", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14595" }, { "name": "20050818 Juniper Netscreen VPN Username Enumeration Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm" }, { "name": "1014728", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014728" }, { "name": "16474", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16474/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2640", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "14595", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14595" }, { "name": "20050818 Juniper Netscreen VPN Username Enumeration Vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2" }, { "name": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm", "refsource": "MISC", "url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm" }, { "name": "1014728", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014728" }, { "name": "16474", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16474/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2640", "datePublished": "2005-08-20T04:00:00", "dateReserved": "2005-08-20T00:00:00", "dateUpdated": "2024-08-07T22:45:01.317Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0347
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 00:17
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in delhomepage.cgi in NetScreen-SA 5000 Series running firmware 3.3 Patch 1 (build 4797) allows remote authenticated users to execute arbitrary script as other users via the row parameter.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/114070 | third-party-advisory, x_refsource_CERT-VN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15368 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=107850564102190&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/9791 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=bugtraq&m=107826362024112&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018120.html | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:17:14.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#114070", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/114070" }, { "name": "netscreen-delhomepagecgi-xss(15368)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15368" }, { "name": "20040304 NetScreen Advisory 58412: XSS Bug in NetScreen-SA SSL VPN", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=107850564102190\u0026w=2" }, { "name": "9791", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/9791" }, { "name": "20040302 03-02-04 XSS Bug in NetScreen-SA 5000 Series of SSL VPN appliance", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=107826362024112\u0026w=2" }, { "name": "20040302 03-02-04 XSS Bug in NetScreen-SA 5000 Series of SSL VPN appliance", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018120.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-03-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in delhomepage.cgi in NetScreen-SA 5000 Series running firmware 3.3 Patch 1 (build 4797) allows remote authenticated users to execute arbitrary script as other users via the row parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-08-13T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "VU#114070", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/114070" }, { "name": "netscreen-delhomepagecgi-xss(15368)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15368" }, { "name": "20040304 NetScreen Advisory 58412: XSS Bug in NetScreen-SA SSL VPN", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=107850564102190\u0026w=2" }, { "name": "9791", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/9791" }, { "name": "20040302 03-02-04 XSS Bug in NetScreen-SA 5000 Series of SSL VPN appliance", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=107826362024112\u0026w=2" }, { "name": "20040302 03-02-04 XSS Bug in NetScreen-SA 5000 Series of SSL VPN appliance", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018120.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0347", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in delhomepage.cgi in NetScreen-SA 5000 Series running firmware 3.3 Patch 1 (build 4797) allows remote authenticated users to execute arbitrary script as other users via the row parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#114070", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/114070" }, { "name": "netscreen-delhomepagecgi-xss(15368)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15368" }, { "name": "20040304 NetScreen Advisory 58412: XSS Bug in NetScreen-SA SSL VPN", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=107850564102190\u0026w=2" }, { "name": "9791", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9791" }, { "name": "20040302 03-02-04 XSS Bug in NetScreen-SA 5000 Series of SSL VPN appliance", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=107826362024112\u0026w=2" }, { "name": "20040302 03-02-04 XSS Bug in NetScreen-SA 5000 Series of SSL VPN appliance", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018120.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0347", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2004-03-17T00:00:00", "dateUpdated": "2024-08-08T00:17:14.290Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }