Search criteria
27 vulnerabilities found for netscreen_screenos by juniper
FKIE_CVE-2018-0059
Vulnerability from fkie_nvd - Published: 2018-10-10 18:29 - Updated: 2024-11-21 03:37
Severity ?
5.4 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
A persistent cross-site scripting vulnerability in the graphical user interface of ScreenOS may allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. Affected releases are Juniper Networks ScreenOS 6.3.0 versions prior to 6.3.0r26.
References
| URL | Tags | ||
|---|---|---|---|
| sirt@juniper.net | https://kb.juniper.net/JSA10894 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://kb.juniper.net/JSA10894 | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| juniper | netscreen_screenos | 6.3.0 | |
| juniper | netscreen_screenos | 6.3.0r1 | |
| juniper | netscreen_screenos | 6.3.0r2 | |
| juniper | netscreen_screenos | 6.3.0r3 | |
| juniper | netscreen_screenos | 6.3.0r4 | |
| juniper | netscreen_screenos | 6.3.0r5 | |
| juniper | netscreen_screenos | 6.3.0r6 | |
| juniper | netscreen_screenos | 6.3.0r7 | |
| juniper | netscreen_screenos | 6.3.0r8 | |
| juniper | netscreen_screenos | 6.3.0r9 | |
| juniper | netscreen_screenos | 6.3.0r10 | |
| juniper | netscreen_screenos | 6.3.0r11 | |
| juniper | netscreen_screenos | 6.3.0r12 | |
| juniper | netscreen_screenos | 6.3.0r13 | |
| juniper | netscreen_screenos | 6.3.0r14 | |
| juniper | netscreen_screenos | 6.3.0r15 | |
| juniper | netscreen_screenos | 6.3.0r16 | |
| juniper | netscreen_screenos | 6.3.0r17 | |
| juniper | netscreen_screenos | 6.3.0r18 | |
| juniper | netscreen_screenos | 6.3.0r19 | |
| juniper | netscreen_screenos | 6.3.0r21 | |
| juniper | netscreen_screenos | 6.3.0r22 | |
| juniper | netscreen_screenos | 6.3.0r23 | |
| juniper | netscreen_screenos | 6.3.0r23b1 | |
| juniper | netscreen_screenos | 6.3.0r24 | |
| juniper | netscreen_screenos | 6.3.0r24b1 | |
| juniper | netscreen_screenos | 6.3.0r25 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "96401D48-27DC-430A-A4B4-948E17BA6E39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "E5A09352-D6E7-4D28-B56B-482EA05CEE17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "31866992-A433-492F-8917-C6EAE2DE93A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "BCC1E507-094A-4E58-860A-13A8358A7B6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r4:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD02B72-9C50-4DF9-97A6-A54716E1FE56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r5:*:*:*:*:*:*:*",
"matchCriteriaId": "2F3DD43B-6F14-4AE5-8D68-605E6B5DE5A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r6:*:*:*:*:*:*:*",
"matchCriteriaId": "D1D1C538-CACD-45A5-B1C1-2335FDA12E97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r7:*:*:*:*:*:*:*",
"matchCriteriaId": "6E699028-E9BC-403A-96CB-E16ED464D01B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r8:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD07648-C22A-4DBF-8B40-CB4A8C3C2102",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r9:*:*:*:*:*:*:*",
"matchCriteriaId": "1004079D-342C-4EC0-974A-2DE56FC3F700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r10:*:*:*:*:*:*:*",
"matchCriteriaId": "6A7D1CD7-5865-41E8-B559-5C6A75A9B62A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r11:*:*:*:*:*:*:*",
"matchCriteriaId": "2DED0811-87AD-4693-B81A-567904FB8D78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r12:*:*:*:*:*:*:*",
"matchCriteriaId": "323B99B7-D519-4DA5-A1DE-7A2A226EEACF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r13:*:*:*:*:*:*:*",
"matchCriteriaId": "FFE094DA-E949-4338-ACB8-53070BA959C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r14:*:*:*:*:*:*:*",
"matchCriteriaId": "36F89341-6353-4884-912E-F6FD0A7751A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r15:*:*:*:*:*:*:*",
"matchCriteriaId": "4CFD2BBD-BBE2-4F53-A0C8-0CBCF7D1B40F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r16:*:*:*:*:*:*:*",
"matchCriteriaId": "248A6131-813B-4A52-87FC-4F1C7012348C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r17:*:*:*:*:*:*:*",
"matchCriteriaId": "AB2D7C68-EA5A-4FAA-AE55-A186B65B81BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r18:*:*:*:*:*:*:*",
"matchCriteriaId": "6EC7AA8A-9876-4B3D-BBFF-FDEEAAFADB6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r19:*:*:*:*:*:*:*",
"matchCriteriaId": "18AB6421-675E-43AC-A8A9-3839C71BAD46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r21:*:*:*:*:*:*:*",
"matchCriteriaId": "93C4AD2D-BFB2-476A-917F-D149F280D02F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r22:*:*:*:*:*:*:*",
"matchCriteriaId": "05A72249-E0FC-4EFF-B81A-BB2A6120681A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r23:*:*:*:*:*:*:*",
"matchCriteriaId": "324C5CAF-199B-4EAE-A3FB-5C8AF90DDFBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r23b1:*:*:*:*:*:*:*",
"matchCriteriaId": "18749046-BC0F-49F0-B89D-723725138D64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r24:*:*:*:*:*:*:*",
"matchCriteriaId": "67704888-85CA-4C4C-94B5-7D0AA5F6DBC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r24b1:*:*:*:*:*:*:*",
"matchCriteriaId": "FAA3B77C-8213-4847-BA56-4A9BF921016F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.3.0r25:*:*:*:*:*:*:*",
"matchCriteriaId": "25C306B0-F3EF-4A01-A5DA-6386FCE0E59F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A persistent cross-site scripting vulnerability in the graphical user interface of ScreenOS may allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. Affected releases are Juniper Networks ScreenOS 6.3.0 versions prior to 6.3.0r26."
},
{
"lang": "es",
"value": "Una vulnerabilidad Cross-Site Scripting (XSS) persistente en la interfaz gr\u00e1fica de usuario de ScreenOS podr\u00eda permitir que un usuario autenticado remoto inyecte scripts web o HTML y robe datos sensibles y credenciales de una sesi\u00f3n de administraci\u00f3n web, posiblemente enga\u00f1ando a un usuario administrativo Las versiones afectadas son Juniper Networks ScreenOS 6.3.0 en versiones anteriores a la 6.3.0r26."
}
],
"id": "CVE-2018-0059",
"lastModified": "2024-11-21T03:37:28.993",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "sirt@juniper.net",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-10-10T18:29:03.250",
"references": [
{
"source": "sirt@juniper.net",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.juniper.net/JSA10894"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://kb.juniper.net/JSA10894"
}
],
"sourceIdentifier": "sirt@juniper.net",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-6096
Vulnerability from fkie_nvd - Published: 2009-02-09 17:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:juniper:netscreen_screenos:1.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "21C730C8-D55E-4DEF-9130-1B3167AFEE7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22455E6B-6FA9-47F6-89FD-797701570AF3",
"versionEndIncluding": "5.4.0r9.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E580BC35-89F2-4083-A6D9-F90FAB3C7685",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9F88A8C0-68F8-42E5-9BCE-DEE19D24A654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F3159CA4-0944-4419-9B60-E93269710377",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2F43896A-2EF6-4069-8B81-815E4C232C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A7DFAB9-4D4D-4179-9DC4-F654D6E2DAB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r2:*:*:*:*:*:*:*",
"matchCriteriaId": "26EC0CE2-5A5C-44ED-A423-CC20B7FFE22F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r3:*:*:*:*:*:*:*",
"matchCriteriaId": "E2BD48EE-C23B-412C-895D-F58CD81FC673",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r4:*:*:*:*:*:*:*",
"matchCriteriaId": "D7A6CA51-F121-44F7-80D1-CF38261D299C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r5:*:*:*:*:*:*:*",
"matchCriteriaId": "B5064E9A-677E-418E-91A7-2DB686B662DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r6:*:*:*:*:*:*:*",
"matchCriteriaId": "DB00325B-29C6-41DA-9274-C9B4C54BC53E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r7:*:*:*:*:*:*:*",
"matchCriteriaId": "8DF67517-638C-4D57-8402-F336A74C4BB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r8:*:*:*:*:*:*:*",
"matchCriteriaId": "07AC301B-0487-4FDB-B1F8-B225099B96FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r9:*:*:*:*:*:*:*",
"matchCriteriaId": "A7CE0BC3-6B59-4EAB-A2BD-CF73B3BD415F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r10:*:*:*:*:*:*:*",
"matchCriteriaId": "B9B65997-2AB7-42D1-A1D9-E999A33366CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r11:*:*:*:*:*:*:*",
"matchCriteriaId": "BB3F1262-141B-48E0-8EAC-97B043EBD9FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r12:*:*:*:*:*:*:*",
"matchCriteriaId": "214DA9E7-E8E5-4579-86E8-A5A8BC887860",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8758A9CA-2F2D-4557-A088-36930CF3B850",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE7F646-B716-47D7-84E8-CA875A85C983",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA96638D-AD5F-4EFD-983B-181DCCF3EAE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r2:*:*:*:*:*:*:*",
"matchCriteriaId": "2E30F9B6-24EB-44FB-9E73-5DD480A48CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r3:*:*:*:*:*:*:*",
"matchCriteriaId": "B1648D07-823B-4BF9-87EC-DB34797B5B5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "28EB52A7-E8EC-46AA-A3F5-81BFA01666D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "A25881AB-69D0-46E5-A502-C65933A457B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "B14314AE-812D-4654-B6CE-43917A1F0542",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "20F7E636-40E0-45CC-A39E-C8BDF9CFBE6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r4:*:*:*:*:*:*:*",
"matchCriteriaId": "463EC9BA-B241-45D6-AB89-53EB8156E40F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "179C18B1-3731-4DBC-A942-D810671401BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r1:*:*:*:*:*:*:*",
"matchCriteriaId": "D53868A9-67B6-40AD-B4F0-6911F1D2FC6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r2:*:*:*:*:*:*:*",
"matchCriteriaId": "8AA52D22-A0D6-413A-9F49-0452356D2BE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r3:*:*:*:*:*:*:*",
"matchCriteriaId": "02BF2DCD-4F61-4FA2-B82B-FB9DEB33054F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r4:*:*:*:*:*:*:*",
"matchCriteriaId": "1C844B2C-26BB-460D-A36E-B74F45169F46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r5:*:*:*:*:*:*:*",
"matchCriteriaId": "93F618F5-E695-41BA-BFDB-E63A9A422F74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r6:*:*:*:*:*:*:*",
"matchCriteriaId": "31811D82-B28F-49CD-8C86-A4DE7CD95F31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r7:*:*:*:*:*:*:*",
"matchCriteriaId": "56D1957D-9F30-4D66-BA14-8015E260C076",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E9FCB548-2488-4EBC-AA21-4A57F5F87E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2A4C0FC0-AB52-498B-84AE-DF2C380B079D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r1:*:*:*:*:*:*:*",
"matchCriteriaId": "6D71F4A5-7380-4E0E-9B81-7CCBECA3EFF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0D99A8DF-C4E2-4415-84F9-27F0E510F53B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r2:*:*:*:*:*:*:*",
"matchCriteriaId": "981D2274-9686-4F6F-83B1-F4D0DA909983",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r3:*:*:*:*:*:*:*",
"matchCriteriaId": "A5CD9C77-891A-4E0D-9D5D-214466699044",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r4:*:*:*:*:*:*:*",
"matchCriteriaId": "F27C7E28-915C-4ECC-A9BC-779F70905614",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r5:*:*:*:*:*:*:*",
"matchCriteriaId": "47206DFC-7840-4CB8-8ED4-2212C287B4DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r6:*:*:*:*:*:*:*",
"matchCriteriaId": "A46904E1-F2E5-45BA-8945-4FB3EF34D299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r7:*:*:*:*:*:*:*",
"matchCriteriaId": "45551432-C02B-426D-89DC-16573A7C8CD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r8:*:*:*:*:*:*:*",
"matchCriteriaId": "CBCFE4A9-9018-4F21-8BB4-D12AD0C33690",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5BFC9DEB-00D5-4FC9-A608-1F7364FF21F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "EDBA6417-9C4C-41D9-91C7-96C255EB2298",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "F7C65E89-186B-4D14-8A40-58B780731DF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "26637853-7036-434E-A9AC-AAC88D84D826",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r4:*:*:*:*:*:*:*",
"matchCriteriaId": "5A890FC9-CF8B-413A-A580-2F59A42D1744",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r5:*:*:*:*:*:*:*",
"matchCriteriaId": "F555CCA2-95D0-4D11-A182-5A00A03403D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r6:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B50AC2-39DE-4446-A9ED-0627C4A9DC21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r7:*:*:*:*:*:*:*",
"matchCriteriaId": "F01ED64F-5617-412D-807D-7FAF0E45172F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r8:*:*:*:*:*:*:*",
"matchCriteriaId": "50B215E3-FDB1-43C6-9A7E-A98F381CB311",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r9:*:*:*:*:*:*:*",
"matchCriteriaId": "058331CE-8DCF-4B8D-83F5-F23D935D9931",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r10:*:*:*:*:*:*:*",
"matchCriteriaId": "98D3D6B3-7BB7-40AC-8FB3-F8362DA36047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r11:*:*:*:*:*:*:*",
"matchCriteriaId": "7C2E0233-3161-4B45-9EB2-D46BE76E1520",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r12:*:*:*:*:*:*:*",
"matchCriteriaId": "12B61290-20EC-4D3C-A7BF-85545F5BA5BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "26958BB3-1484-42EC-AC3A-33A748B377F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:dial:*:*:*:*:*",
"matchCriteriaId": "6AB0B6EE-BEDE-46AD-859E-9601297B0217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:dial2:*:*:*:*:*",
"matchCriteriaId": "6824A137-79B1-4473-A333-90BA7AF25EC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "E9E29D5B-872A-4CD5-9A44-EBFA5A7C7554",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "BE3851B7-72BC-4DDF-A718-69068128CA15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "19A6D877-DF7D-4E9B-8855-2ACF97C5FC29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r4:*:*:*:*:*:*:*",
"matchCriteriaId": "54FBDD05-CAA6-4034-8C2D-94E965BE2132",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r5:*:*:*:*:*:*:*",
"matchCriteriaId": "7BD1CFF3-3211-43E2-858C-37142EE54490",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r6:*:*:*:*:*:*:*",
"matchCriteriaId": "9BC0306C-FDDD-4B5F-B371-17CA2231C63A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r7:*:*:*:*:*:*:*",
"matchCriteriaId": "63E607F4-E348-4385-9C2C-558BB0402585",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r8:*:*:*:*:*:*:*",
"matchCriteriaId": "35CA445F-428A-4EDB-A18A-5E626D0E04BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r9:*:*:*:*:*:*:*",
"matchCriteriaId": "9E8885D9-20A0-443D-9650-912F360C9B14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r10:*:*:*:*:*:*:*",
"matchCriteriaId": "4FD70CC4-334A-4734-97DE-C31A6C2014AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r11:*:*:*:*:*:*:*",
"matchCriteriaId": "AC456F90-05EB-4C88-9650-ED71A35A80C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r12:*:*:*:*:*:*:*",
"matchCriteriaId": "FAEA92AE-A047-4A20-A209-B9CAC646BFC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "78FF0914-F907-41F4-9F2D-6ECD601C73C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r1:*:*:*:*:*:*:*",
"matchCriteriaId": "48518416-3F00-4174-A0EF-57E5A614F8A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r2:*:*:*:*:*:*:*",
"matchCriteriaId": "ACCD6F2D-642E-407E-A16D-73B97F709431",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r3:*:*:*:*:*:*:*",
"matchCriteriaId": "438438F8-C7C3-427A-B7AA-1E7F8DA5C014",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r4:*:*:*:*:*:*:*",
"matchCriteriaId": "ED08E19A-67ED-47F9-B40F-B8CFF496AF7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r5:*:*:*:*:*:*:*",
"matchCriteriaId": "FB9021FD-198B-4D7D-BAF3-D83EC3D64EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r6:*:*:*:*:*:*:*",
"matchCriteriaId": "01E861C0-AF82-4F7C-A515-005083D7D699",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r7:*:*:*:*:*:*:*",
"matchCriteriaId": "38B7AEE2-BAA4-4FDA-A627-F5A7370D2C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r8:*:*:*:*:*:*:*",
"matchCriteriaId": "3BCB5149-8C43-42A2-A9B2-541802FBE5B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r9:*:*:*:*:*:*:*",
"matchCriteriaId": "2C3A3552-2D77-494E-902E-9529AA2074D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r10:*:*:*:*:*:*:*",
"matchCriteriaId": "BD90D085-60F7-4B3F-8C82-B9F362EFFB89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "627A41F5-BE3C-41AD-B455-0D73BE5CA010",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7D41144E-9F64-4919-87DA-09092AA2030A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r1:*:*:*:*:*:*:*",
"matchCriteriaId": "F85BBA70-D185-4A84-8D66-2D3ACE336C6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r2:*:*:*:*:*:*:*",
"matchCriteriaId": "D0F6E761-1941-4B9F-98DC-1EED40B851A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r3:*:*:*:*:*:*:*",
"matchCriteriaId": "3A3720A8-B042-4366-A4F2-2262CDD0CAF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r4:*:*:*:*:*:*:*",
"matchCriteriaId": "66AEC6EE-F483-4156-91DB-E939B45D09E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r5:*:*:*:*:*:*:*",
"matchCriteriaId": "EA33B84C-73DD-4074-985E-CF95A3F0468D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D29B7C5-643E-4339-B13A-9134DDE1AE6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r7:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF33673-F050-4D3F-8078-584D3B740529",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r8:*:*:*:*:*:*:*",
"matchCriteriaId": "0F7D82C7-866C-4279-8675-1F9138A4AB6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r9:*:*:*:*:*:*:*",
"matchCriteriaId": "02F22245-4C40-4500-9C17-778C1856BBD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4F4B1021-40CB-4A11-9650-F1BDBD6943D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "11E6EF4D-86A1-4288-926E-8CF4FE02BDEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "4B522236-0FBC-4B03-8DA3-95130FD3B6E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2E3C90-1F2F-4CCF-98CB-F8F568BAA65A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r4:*:*:*:*:*:*:*",
"matchCriteriaId": "ECDA2644-4771-450E-8798-120C565EE803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r5:*:*:*:*:*:*:*",
"matchCriteriaId": "495D80E7-AA96-4DBC-A6D9-47004D3D9D68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r6:*:*:*:*:*:*:*",
"matchCriteriaId": "F1729899-3CDC-4A04-BE91-863B5751B55B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r7:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFF3E46-FAAF-4E06-B19F-12D0C9F17A3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r8:*:*:*:*:*:*:*",
"matchCriteriaId": "F0EC1E3B-89A5-4210-86F0-B2C9C3FEF934",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r9:*:*:*:*:*:*:*",
"matchCriteriaId": "A389EA30-D4BC-407B-9961-4ABEDF6733BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r10:*:*:*:*:*:*:*",
"matchCriteriaId": "D16A0E5A-8CA3-42CC-AE45-E349FA4EC3C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r11:*:*:*:*:*:*:*",
"matchCriteriaId": "F22AE889-F918-45C7-B809-FDB314D54270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "19172BCC-BFF0-4031-8AFE-B63422731B17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D61988-689E-44D3-8652-B434359068D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "F7B87BFF-30AE-4E44-AAB8-319418580D7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "1B4F94EF-318A-41B6-A576-F97107A6419C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0r4:*:*:*:*:*:*:*",
"matchCriteriaId": "11C66AB2-DE61-4B80-B438-53805EF62BF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "98471F46-A271-4B0A-89A9-12D544474393",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.2.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "1A5724A7-933D-47D8-B8F8-0CB62EECB7DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.2.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "33060767-0F2D-40A4-AA94-81006A57BBFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.2.0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "AEFDF650-89C8-44DC-80E1-6D8F5CF5568F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "29D5A3D5-15AF-4530-AF5D-1D310DCEC711",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "226355D7-D2C5-4A76-B48C-EC125224BD6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "CA229FDB-B699-489E-9BE0-834BDEBD60D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "38C10C31-58EF-424A-8D19-2514C9B0BE8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r4:*:*:*:*:*:*:*",
"matchCriteriaId": "28AF5FAA-6A71-479F-9B43-4697C9F9D6B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r5:*:*:*:*:*:*:*",
"matchCriteriaId": "1D9D8881-13BD-4996-ABA7-9D2B5039536F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r6:*:*:*:*:*:*:*",
"matchCriteriaId": "26CC22C6-0529-4751-AA96-019D08EB4E96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r7:*:*:*:*:*:*:*",
"matchCriteriaId": "85C53FA0-1908-4184-B96A-C90E78ADAE8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r8:*:*:*:*:*:*:*",
"matchCriteriaId": "5CA85126-F442-4453-B1FA-67FA44310562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r9:*:*:*:*:*:*:*",
"matchCriteriaId": "95BC2FAA-960E-4338-A603-DD4E40346EDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r10:*:*:*:*:*:*:*",
"matchCriteriaId": "9182E415-88C5-4E03-B909-C0F6474E377B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "12496D16-A004-4CFB-AF81-B70AB0EE9053",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "78D7F1E6-D876-4A12-A776-C4B35F0DCEB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "6D24D89F-A056-4246-854D-09AD8F68EF0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "3FAFB4F0-DDF6-4B1A-B3E9-A8D279A2208E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0r4:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F0B37B-EFB4-4E28-8506-8E5174A756F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0r5:*:*:*:*:*:*:*",
"matchCriteriaId": "EA7AAD75-2BA1-4FEA-BC3D-C722BF5B0BEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0r6:*:*:*:*:*:*:*",
"matchCriteriaId": "E7C21816-A179-4B02-A9C4-C2DDF4CC80C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0r7:*:*:*:*:*:*:*",
"matchCriteriaId": "A948870F-8F42-4DDB-A5BA-2D8107C11E78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0r8:*:*:*:*:*:*:*",
"matchCriteriaId": "88440D31-ECF0-490D-94E3-197DBDF482DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0r8a:*:*:*:*:*:*:*",
"matchCriteriaId": "91539711-3E94-43D9-8ACE-9F201E68FA85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.0.0r6:*:*:*:*:*:*:*",
"matchCriteriaId": "8EB4EFAC-52A9-4083-91AE-93CB2197C090",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:6.1.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "9DDEBDFC-169C-416E-8FFB-F0E142F1760B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Juniper NetScreen ScreenOS anteriores a v5.4r10, v6.0r6, y v6.1r2, permite a atacantes remotos inyectar secuencias de comandos web o HTML mediante el par\u00e1metro nombre de usuario en (1) p\u00e1gina de autenticaci\u00f3n del interfase web o (2) la p\u00e1gina de autenticaci\u00f3n telnet.\r\n"
}
],
"id": "CVE-2008-6096",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2009-02-09T17:30:00.297",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32078"
},
{
"source": "cve@mitre.org",
"url": "http://www.layereddefense.com/netscreen01oct.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/31528"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2008/2713"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32078"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.layereddefense.com/netscreen01oct.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/31528"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2008/2713"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2005-2640
Vulnerability from fkie_nvd - Published: 2005-08-23 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A037FAA6-6D26-4496-BC67-03475B4D1155",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D3831DD3-E783-4200-8986-FDBF7DD9BA53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2909C9D5-3D8F-4C41-B0E7-A0C0B432C19A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E09436DF-E3C1-4C03-A3BE-73C4BC84BB7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "699764B6-0F86-4AB0-86A3-4F2E69AD820C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "24BB54A7-24D0-409E-8924-D212543E4AAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.64:*:*:*:*:*:*:*",
"matchCriteriaId": "74187E80-0EDA-4FE7-A113-FCB723AF08B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.66:*:*:*:*:*:*:*",
"matchCriteriaId": "0D6691BE-2591-495A-BB72-2DA9956944A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.66_r2:*:*:*:*:*:*:*",
"matchCriteriaId": "CAB79FD3-29CB-4694-9A67-C6AF2EADA89D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.73_r1:*:*:*:*:*:*:*",
"matchCriteriaId": "92455F85-9BFA-4684-9A6D-0E52AFA7161B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.73_r2:*:*:*:*:*:*:*",
"matchCriteriaId": "1173EA59-AEAE-49E6-B6DD-775B28C678D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.0.1_r8:*:*:*:*:*:*:*",
"matchCriteriaId": "6711CD61-E16E-41B8-8948-592171D73B5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD0131A-D07C-4B23-8CEC-E7CF659DB55E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.1_r6:*:*:*:*:*:*:*",
"matchCriteriaId": "2837DDC0-9F2C-4782-AA1E-5315AB12528F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.1_r7:*:*:*:*:*:*:*",
"matchCriteriaId": "07B065C9-93C6-43EB-ADD1-532FC6FBEA87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4D38841C-DF2D-41D8-BD15-EBBB9E9D83E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5r1:*:*:*:*:*:*:*",
"matchCriteriaId": "DDDBDBE1-E16B-4F03-9072-8B28E9467FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5r2:*:*:*:*:*:*:*",
"matchCriteriaId": "4E099835-7C70-44F1-9E2B-07AF5B3C0577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5r6:*:*:*:*:*:*:*",
"matchCriteriaId": "D10CDE09-1896-4E99-B2A0-93F89164225A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F3159CA4-0944-4419-9B60-E93269710377",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2F43896A-2EF6-4069-8B81-815E4C232C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A7DFAB9-4D4D-4179-9DC4-F654D6E2DAB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r2:*:*:*:*:*:*:*",
"matchCriteriaId": "26EC0CE2-5A5C-44ED-A423-CC20B7FFE22F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r3:*:*:*:*:*:*:*",
"matchCriteriaId": "E2BD48EE-C23B-412C-895D-F58CD81FC673",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r4:*:*:*:*:*:*:*",
"matchCriteriaId": "D7A6CA51-F121-44F7-80D1-CF38261D299C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r5:*:*:*:*:*:*:*",
"matchCriteriaId": "B5064E9A-677E-418E-91A7-2DB686B662DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r6:*:*:*:*:*:*:*",
"matchCriteriaId": "DB00325B-29C6-41DA-9274-C9B4C54BC53E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r7:*:*:*:*:*:*:*",
"matchCriteriaId": "8DF67517-638C-4D57-8402-F336A74C4BB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r8:*:*:*:*:*:*:*",
"matchCriteriaId": "07AC301B-0487-4FDB-B1F8-B225099B96FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r9:*:*:*:*:*:*:*",
"matchCriteriaId": "A7CE0BC3-6B59-4EAB-A2BD-CF73B3BD415F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r10:*:*:*:*:*:*:*",
"matchCriteriaId": "B9B65997-2AB7-42D1-A1D9-E999A33366CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r11:*:*:*:*:*:*:*",
"matchCriteriaId": "BB3F1262-141B-48E0-8EAC-97B043EBD9FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r12:*:*:*:*:*:*:*",
"matchCriteriaId": "214DA9E7-E8E5-4579-86E8-A5A8BC887860",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE7F646-B716-47D7-84E8-CA875A85C983",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA96638D-AD5F-4EFD-983B-181DCCF3EAE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r2:*:*:*:*:*:*:*",
"matchCriteriaId": "2E30F9B6-24EB-44FB-9E73-5DD480A48CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r3:*:*:*:*:*:*:*",
"matchCriteriaId": "B1648D07-823B-4BF9-87EC-DB34797B5B5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2D06FC50-39AE-4988-8C96-38A991CD7F97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.8_r1:*:*:*:*:*:*:*",
"matchCriteriaId": "B33B8346-B753-443F-BB24-74FF6C55340B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r3:*:*:*:*:*:*:*",
"matchCriteriaId": "47DE8E73-0F1B-42E4-9BD6-7F5066D7330B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r4:*:*:*:*:*:*:*",
"matchCriteriaId": "057B0387-44C0-45BE-9D91-D5A01C9D8020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "28EB52A7-E8EC-46AA-A3F5-81BFA01666D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "A25881AB-69D0-46E5-A502-C65933A457B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "B14314AE-812D-4654-B6CE-43917A1F0542",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "20F7E636-40E0-45CC-A39E-C8BDF9CFBE6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r4:*:*:*:*:*:*:*",
"matchCriteriaId": "463EC9BA-B241-45D6-AB89-53EB8156E40F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "179C18B1-3731-4DBC-A942-D810671401BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r1:*:*:*:*:*:*:*",
"matchCriteriaId": "D53868A9-67B6-40AD-B4F0-6911F1D2FC6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r2:*:*:*:*:*:*:*",
"matchCriteriaId": "8AA52D22-A0D6-413A-9F49-0452356D2BE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r3:*:*:*:*:*:*:*",
"matchCriteriaId": "02BF2DCD-4F61-4FA2-B82B-FB9DEB33054F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r4:*:*:*:*:*:*:*",
"matchCriteriaId": "1C844B2C-26BB-460D-A36E-B74F45169F46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r5:*:*:*:*:*:*:*",
"matchCriteriaId": "93F618F5-E695-41BA-BFDB-E63A9A422F74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r6:*:*:*:*:*:*:*",
"matchCriteriaId": "31811D82-B28F-49CD-8C86-A4DE7CD95F31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r7:*:*:*:*:*:*:*",
"matchCriteriaId": "56D1957D-9F30-4D66-BA14-8015E260C076",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E9FCB548-2488-4EBC-AA21-4A57F5F87E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2A4C0FC0-AB52-498B-84AE-DF2C380B079D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3_r1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "05578911-51E3-447B-98B6-083D3F35E8F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r1:*:*:*:*:*:*:*",
"matchCriteriaId": "6D71F4A5-7380-4E0E-9B81-7CCBECA3EFF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r2:*:*:*:*:*:*:*",
"matchCriteriaId": "981D2274-9686-4F6F-83B1-F4D0DA909983",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r3:*:*:*:*:*:*:*",
"matchCriteriaId": "A5CD9C77-891A-4E0D-9D5D-214466699044",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r4:*:*:*:*:*:*:*",
"matchCriteriaId": "F27C7E28-915C-4ECC-A9BC-779F70905614",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r5:*:*:*:*:*:*:*",
"matchCriteriaId": "47206DFC-7840-4CB8-8ED4-2212C287B4DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r6:*:*:*:*:*:*:*",
"matchCriteriaId": "A46904E1-F2E5-45BA-8945-4FB3EF34D299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r7:*:*:*:*:*:*:*",
"matchCriteriaId": "45551432-C02B-426D-89DC-16573A7C8CD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r8:*:*:*:*:*:*:*",
"matchCriteriaId": "CBCFE4A9-9018-4F21-8BB4-D12AD0C33690",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5BFC9DEB-00D5-4FC9-A608-1F7364FF21F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "EDBA6417-9C4C-41D9-91C7-96C255EB2298",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "F7C65E89-186B-4D14-8A40-58B780731DF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "26637853-7036-434E-A9AC-AAC88D84D826",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r4:*:*:*:*:*:*:*",
"matchCriteriaId": "5A890FC9-CF8B-413A-A580-2F59A42D1744",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r5:*:*:*:*:*:*:*",
"matchCriteriaId": "F555CCA2-95D0-4D11-A182-5A00A03403D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r6:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B50AC2-39DE-4446-A9ED-0627C4A9DC21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r7:*:*:*:*:*:*:*",
"matchCriteriaId": "F01ED64F-5617-412D-807D-7FAF0E45172F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r8:*:*:*:*:*:*:*",
"matchCriteriaId": "50B215E3-FDB1-43C6-9A7E-A98F381CB311",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r9:*:*:*:*:*:*:*",
"matchCriteriaId": "058331CE-8DCF-4B8D-83F5-F23D935D9931",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r10:*:*:*:*:*:*:*",
"matchCriteriaId": "98D3D6B3-7BB7-40AC-8FB3-F8362DA36047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r11:*:*:*:*:*:*:*",
"matchCriteriaId": "7C2E0233-3161-4B45-9EB2-D46BE76E1520",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r12:*:*:*:*:*:*:*",
"matchCriteriaId": "12B61290-20EC-4D3C-A7BF-85545F5BA5BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.1_r2:*:*:*:*:*:*:*",
"matchCriteriaId": "A85A76EC-8F86-47A6-A85A-8B4216C99142",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "26958BB3-1484-42EC-AC3A-33A748B377F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:dial:*:*:*:*:*",
"matchCriteriaId": "6AB0B6EE-BEDE-46AD-859E-9601297B0217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "E9E29D5B-872A-4CD5-9A44-EBFA5A7C7554",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "BE3851B7-72BC-4DDF-A718-69068128CA15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "19A6D877-DF7D-4E9B-8855-2ACF97C5FC29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r4:*:*:*:*:*:*:*",
"matchCriteriaId": "54FBDD05-CAA6-4034-8C2D-94E965BE2132",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r5:*:*:*:*:*:*:*",
"matchCriteriaId": "7BD1CFF3-3211-43E2-858C-37142EE54490",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r6:*:*:*:*:*:*:*",
"matchCriteriaId": "9BC0306C-FDDD-4B5F-B371-17CA2231C63A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r7:*:*:*:*:*:*:*",
"matchCriteriaId": "63E607F4-E348-4385-9C2C-558BB0402585",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r8:*:*:*:*:*:*:*",
"matchCriteriaId": "35CA445F-428A-4EDB-A18A-5E626D0E04BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r9:*:*:*:*:*:*:*",
"matchCriteriaId": "9E8885D9-20A0-443D-9650-912F360C9B14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r10:*:*:*:*:*:*:*",
"matchCriteriaId": "4FD70CC4-334A-4734-97DE-C31A6C2014AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r11:*:*:*:*:*:*:*",
"matchCriteriaId": "AC456F90-05EB-4C88-9650-ED71A35A80C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r12:*:*:*:*:*:*:*",
"matchCriteriaId": "FAEA92AE-A047-4A20-A209-B9CAC646BFC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "78FF0914-F907-41F4-9F2D-6ECD601C73C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r1:*:*:*:*:*:*:*",
"matchCriteriaId": "48518416-3F00-4174-A0EF-57E5A614F8A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r2:*:*:*:*:*:*:*",
"matchCriteriaId": "ACCD6F2D-642E-407E-A16D-73B97F709431",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r3:*:*:*:*:*:*:*",
"matchCriteriaId": "438438F8-C7C3-427A-B7AA-1E7F8DA5C014",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r4:*:*:*:*:*:*:*",
"matchCriteriaId": "ED08E19A-67ED-47F9-B40F-B8CFF496AF7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r5:*:*:*:*:*:*:*",
"matchCriteriaId": "FB9021FD-198B-4D7D-BAF3-D83EC3D64EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r6:*:*:*:*:*:*:*",
"matchCriteriaId": "01E861C0-AF82-4F7C-A515-005083D7D699",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r7:*:*:*:*:*:*:*",
"matchCriteriaId": "38B7AEE2-BAA4-4FDA-A627-F5A7370D2C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r8:*:*:*:*:*:*:*",
"matchCriteriaId": "3BCB5149-8C43-42A2-A9B2-541802FBE5B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r9:*:*:*:*:*:*:*",
"matchCriteriaId": "2C3A3552-2D77-494E-902E-9529AA2074D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r10:*:*:*:*:*:*:*",
"matchCriteriaId": "BD90D085-60F7-4B3F-8C82-B9F362EFFB89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "627A41F5-BE3C-41AD-B455-0D73BE5CA010",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7D41144E-9F64-4919-87DA-09092AA2030A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r1:*:*:*:*:*:*:*",
"matchCriteriaId": "F85BBA70-D185-4A84-8D66-2D3ACE336C6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r2:*:*:*:*:*:*:*",
"matchCriteriaId": "D0F6E761-1941-4B9F-98DC-1EED40B851A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r3:*:*:*:*:*:*:*",
"matchCriteriaId": "3A3720A8-B042-4366-A4F2-2262CDD0CAF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r4:*:*:*:*:*:*:*",
"matchCriteriaId": "66AEC6EE-F483-4156-91DB-E939B45D09E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4F4B1021-40CB-4A11-9650-F1BDBD6943D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "19172BCC-BFF0-4031-8AFE-B63422731B17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0r3a:*:*:*:*:*:*:*",
"matchCriteriaId": "3ACCBC8E-7C9E-4C3A-8A0F-BBF4E2F92AD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "98471F46-A271-4B0A-89A9-12D544474393",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:netscreen:ns-10:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8FDFE9E5-AA71-4D17-886A-E0B493B4B833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:netscreen:ns-100:3.0_.pe1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "27E6687D-08CF-48AC-8112-555149E57B45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:netscreen:ns-204:5.0.0_r6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "04797E9E-60CB-40B3-BE23-6051C72A43D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:netscreen:ns-204:0110.0_11_4.0_r10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "871B28F0-C082-4AD1-A4DE-22B3DC00E6BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:netscreen:ns-204:0110.0_11_5.1.0_r3a:*:*:*:*:*:*:*",
"matchCriteriaId": "1AEABCBA-45BD-45B0-9343-68178FDCB493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:netscreen:ns-500:4110.0_11_4.0_r10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0F057D3-1ECB-4804-8C83-9277EFD4C322",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:netscreen:ns-500:4110.0_11_5.1.0_r3a:*:*:*:*:*:*:*",
"matchCriteriaId": "6D551820-CF22-4F80-A2A6-223D9CE63444",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:netscreen:ns-50ns25:5.0.0_r6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "877DF54F-752E-4FBC-8E00-7F5FD3AE63E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:juniper:netscreen-5gt:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A482DFA5-4108-4B0F-BD8E-04FEB52D3537",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:juniper:netscreen-idp:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3B97B63E-CE45-4DF9-9838-D9CE96CECE72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:juniper:netscreen-idp:3.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE5F6D51-15B0-449D-9418-8C4C7A1E1D7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:juniper:netscreen-idp:3.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "C696E607-0927-4087-A437-9C5459EB8BE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:juniper:netscreen-idp_10:3.0.1_r1:*:*:*:*:*:*:*",
"matchCriteriaId": "142A3E18-3E20-415E-A53C-01E1C8865300",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:juniper:netscreen-idp_100:3.0.1_r1:*:*:*:*:*:*:*",
"matchCriteriaId": "957172A3-6B8A-48E1-911F-28A6F055FB41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:juniper:netscreen-idp_1000:3.0.1_r1:*:*:*:*:*:*:*",
"matchCriteriaId": "95A9B902-09D4-4A29-9BA7-FD7898B24ECC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:juniper:netscreen-idp_500:3.0.1_r1:*:*:*:*:*:*:*",
"matchCriteriaId": "214A7AFF-B36F-4ABC-8C7D-93B1493ADEB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:netscreen:netscreen-sa_5000_series:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA34EB36-E5E9-43B6-ABB8-B292BC7B0CBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:netscreen:netscreen-sa_5020_series:4.2_r2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "56B26742-2B48-4D2A-8AA3-9E86ED482424",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:netscreen:netscreen-sa_5050_series:4.2_r2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6B9103D8-B207-4622-AA6C-8D58EB36688E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid."
}
],
"id": "CVE-2005-2640",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-08-23T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/16474/"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1014728"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/14595"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/16474/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1014728"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/14595"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2004-1446
Vulnerability from fkie_nvd - Published: 2004-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "24BB54A7-24D0-409E-8924-D212543E4AAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.64:*:*:*:*:*:*:*",
"matchCriteriaId": "74187E80-0EDA-4FE7-A113-FCB723AF08B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.66:*:*:*:*:*:*:*",
"matchCriteriaId": "0D6691BE-2591-495A-BB72-2DA9956944A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.66_r2:*:*:*:*:*:*:*",
"matchCriteriaId": "CAB79FD3-29CB-4694-9A67-C6AF2EADA89D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.73_r1:*:*:*:*:*:*:*",
"matchCriteriaId": "92455F85-9BFA-4684-9A6D-0E52AFA7161B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.73_r2:*:*:*:*:*:*:*",
"matchCriteriaId": "1173EA59-AEAE-49E6-B6DD-775B28C678D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.0.1_r8:*:*:*:*:*:*:*",
"matchCriteriaId": "6711CD61-E16E-41B8-8948-592171D73B5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD0131A-D07C-4B23-8CEC-E7CF659DB55E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.1_r6:*:*:*:*:*:*:*",
"matchCriteriaId": "2837DDC0-9F2C-4782-AA1E-5315AB12528F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.1_r7:*:*:*:*:*:*:*",
"matchCriteriaId": "07B065C9-93C6-43EB-ADD1-532FC6FBEA87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4D38841C-DF2D-41D8-BD15-EBBB9E9D83E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5r1:*:*:*:*:*:*:*",
"matchCriteriaId": "DDDBDBE1-E16B-4F03-9072-8B28E9467FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5r2:*:*:*:*:*:*:*",
"matchCriteriaId": "4E099835-7C70-44F1-9E2B-07AF5B3C0577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5r6:*:*:*:*:*:*:*",
"matchCriteriaId": "D10CDE09-1896-4E99-B2A0-93F89164225A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F3159CA4-0944-4419-9B60-E93269710377",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2F43896A-2EF6-4069-8B81-815E4C232C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A7DFAB9-4D4D-4179-9DC4-F654D6E2DAB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r2:*:*:*:*:*:*:*",
"matchCriteriaId": "26EC0CE2-5A5C-44ED-A423-CC20B7FFE22F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r3:*:*:*:*:*:*:*",
"matchCriteriaId": "E2BD48EE-C23B-412C-895D-F58CD81FC673",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r4:*:*:*:*:*:*:*",
"matchCriteriaId": "D7A6CA51-F121-44F7-80D1-CF38261D299C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r5:*:*:*:*:*:*:*",
"matchCriteriaId": "B5064E9A-677E-418E-91A7-2DB686B662DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r6:*:*:*:*:*:*:*",
"matchCriteriaId": "DB00325B-29C6-41DA-9274-C9B4C54BC53E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r7:*:*:*:*:*:*:*",
"matchCriteriaId": "8DF67517-638C-4D57-8402-F336A74C4BB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r8:*:*:*:*:*:*:*",
"matchCriteriaId": "07AC301B-0487-4FDB-B1F8-B225099B96FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r9:*:*:*:*:*:*:*",
"matchCriteriaId": "A7CE0BC3-6B59-4EAB-A2BD-CF73B3BD415F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r10:*:*:*:*:*:*:*",
"matchCriteriaId": "B9B65997-2AB7-42D1-A1D9-E999A33366CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r11:*:*:*:*:*:*:*",
"matchCriteriaId": "BB3F1262-141B-48E0-8EAC-97B043EBD9FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r12:*:*:*:*:*:*:*",
"matchCriteriaId": "214DA9E7-E8E5-4579-86E8-A5A8BC887860",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE7F646-B716-47D7-84E8-CA875A85C983",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA96638D-AD5F-4EFD-983B-181DCCF3EAE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r2:*:*:*:*:*:*:*",
"matchCriteriaId": "2E30F9B6-24EB-44FB-9E73-5DD480A48CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r3:*:*:*:*:*:*:*",
"matchCriteriaId": "B1648D07-823B-4BF9-87EC-DB34797B5B5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2D06FC50-39AE-4988-8C96-38A991CD7F97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.8_r1:*:*:*:*:*:*:*",
"matchCriteriaId": "B33B8346-B753-443F-BB24-74FF6C55340B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r3:*:*:*:*:*:*:*",
"matchCriteriaId": "47DE8E73-0F1B-42E4-9BD6-7F5066D7330B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r4:*:*:*:*:*:*:*",
"matchCriteriaId": "057B0387-44C0-45BE-9D91-D5A01C9D8020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "28EB52A7-E8EC-46AA-A3F5-81BFA01666D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "A25881AB-69D0-46E5-A502-C65933A457B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "B14314AE-812D-4654-B6CE-43917A1F0542",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "20F7E636-40E0-45CC-A39E-C8BDF9CFBE6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r4:*:*:*:*:*:*:*",
"matchCriteriaId": "463EC9BA-B241-45D6-AB89-53EB8156E40F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "179C18B1-3731-4DBC-A942-D810671401BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r1:*:*:*:*:*:*:*",
"matchCriteriaId": "D53868A9-67B6-40AD-B4F0-6911F1D2FC6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r2:*:*:*:*:*:*:*",
"matchCriteriaId": "8AA52D22-A0D6-413A-9F49-0452356D2BE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r3:*:*:*:*:*:*:*",
"matchCriteriaId": "02BF2DCD-4F61-4FA2-B82B-FB9DEB33054F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r4:*:*:*:*:*:*:*",
"matchCriteriaId": "1C844B2C-26BB-460D-A36E-B74F45169F46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r5:*:*:*:*:*:*:*",
"matchCriteriaId": "93F618F5-E695-41BA-BFDB-E63A9A422F74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r6:*:*:*:*:*:*:*",
"matchCriteriaId": "31811D82-B28F-49CD-8C86-A4DE7CD95F31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r7:*:*:*:*:*:*:*",
"matchCriteriaId": "56D1957D-9F30-4D66-BA14-8015E260C076",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E9FCB548-2488-4EBC-AA21-4A57F5F87E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2A4C0FC0-AB52-498B-84AE-DF2C380B079D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3_r1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "05578911-51E3-447B-98B6-083D3F35E8F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r1:*:*:*:*:*:*:*",
"matchCriteriaId": "6D71F4A5-7380-4E0E-9B81-7CCBECA3EFF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r2:*:*:*:*:*:*:*",
"matchCriteriaId": "981D2274-9686-4F6F-83B1-F4D0DA909983",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r3:*:*:*:*:*:*:*",
"matchCriteriaId": "A5CD9C77-891A-4E0D-9D5D-214466699044",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r4:*:*:*:*:*:*:*",
"matchCriteriaId": "F27C7E28-915C-4ECC-A9BC-779F70905614",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r5:*:*:*:*:*:*:*",
"matchCriteriaId": "47206DFC-7840-4CB8-8ED4-2212C287B4DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r6:*:*:*:*:*:*:*",
"matchCriteriaId": "A46904E1-F2E5-45BA-8945-4FB3EF34D299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r7:*:*:*:*:*:*:*",
"matchCriteriaId": "45551432-C02B-426D-89DC-16573A7C8CD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r8:*:*:*:*:*:*:*",
"matchCriteriaId": "CBCFE4A9-9018-4F21-8BB4-D12AD0C33690",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5BFC9DEB-00D5-4FC9-A608-1F7364FF21F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "EDBA6417-9C4C-41D9-91C7-96C255EB2298",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "F7C65E89-186B-4D14-8A40-58B780731DF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "26637853-7036-434E-A9AC-AAC88D84D826",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r4:*:*:*:*:*:*:*",
"matchCriteriaId": "5A890FC9-CF8B-413A-A580-2F59A42D1744",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r5:*:*:*:*:*:*:*",
"matchCriteriaId": "F555CCA2-95D0-4D11-A182-5A00A03403D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r6:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B50AC2-39DE-4446-A9ED-0627C4A9DC21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r7:*:*:*:*:*:*:*",
"matchCriteriaId": "F01ED64F-5617-412D-807D-7FAF0E45172F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r8:*:*:*:*:*:*:*",
"matchCriteriaId": "50B215E3-FDB1-43C6-9A7E-A98F381CB311",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r9:*:*:*:*:*:*:*",
"matchCriteriaId": "058331CE-8DCF-4B8D-83F5-F23D935D9931",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r10:*:*:*:*:*:*:*",
"matchCriteriaId": "98D3D6B3-7BB7-40AC-8FB3-F8362DA36047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r11:*:*:*:*:*:*:*",
"matchCriteriaId": "7C2E0233-3161-4B45-9EB2-D46BE76E1520",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r12:*:*:*:*:*:*:*",
"matchCriteriaId": "12B61290-20EC-4D3C-A7BF-85545F5BA5BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.1_r2:*:*:*:*:*:*:*",
"matchCriteriaId": "A85A76EC-8F86-47A6-A85A-8B4216C99142",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "26958BB3-1484-42EC-AC3A-33A748B377F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:dial:*:*:*:*:*",
"matchCriteriaId": "6AB0B6EE-BEDE-46AD-859E-9601297B0217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "E9E29D5B-872A-4CD5-9A44-EBFA5A7C7554",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "BE3851B7-72BC-4DDF-A718-69068128CA15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "19A6D877-DF7D-4E9B-8855-2ACF97C5FC29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r4:*:*:*:*:*:*:*",
"matchCriteriaId": "54FBDD05-CAA6-4034-8C2D-94E965BE2132",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r5:*:*:*:*:*:*:*",
"matchCriteriaId": "7BD1CFF3-3211-43E2-858C-37142EE54490",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r6:*:*:*:*:*:*:*",
"matchCriteriaId": "9BC0306C-FDDD-4B5F-B371-17CA2231C63A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r7:*:*:*:*:*:*:*",
"matchCriteriaId": "63E607F4-E348-4385-9C2C-558BB0402585",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r8:*:*:*:*:*:*:*",
"matchCriteriaId": "35CA445F-428A-4EDB-A18A-5E626D0E04BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r9:*:*:*:*:*:*:*",
"matchCriteriaId": "9E8885D9-20A0-443D-9650-912F360C9B14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r10:*:*:*:*:*:*:*",
"matchCriteriaId": "4FD70CC4-334A-4734-97DE-C31A6C2014AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r11:*:*:*:*:*:*:*",
"matchCriteriaId": "AC456F90-05EB-4C88-9650-ED71A35A80C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r12:*:*:*:*:*:*:*",
"matchCriteriaId": "FAEA92AE-A047-4A20-A209-B9CAC646BFC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "78FF0914-F907-41F4-9F2D-6ECD601C73C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r1:*:*:*:*:*:*:*",
"matchCriteriaId": "48518416-3F00-4174-A0EF-57E5A614F8A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r2:*:*:*:*:*:*:*",
"matchCriteriaId": "ACCD6F2D-642E-407E-A16D-73B97F709431",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r3:*:*:*:*:*:*:*",
"matchCriteriaId": "438438F8-C7C3-427A-B7AA-1E7F8DA5C014",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r4:*:*:*:*:*:*:*",
"matchCriteriaId": "ED08E19A-67ED-47F9-B40F-B8CFF496AF7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r5:*:*:*:*:*:*:*",
"matchCriteriaId": "FB9021FD-198B-4D7D-BAF3-D83EC3D64EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r6:*:*:*:*:*:*:*",
"matchCriteriaId": "01E861C0-AF82-4F7C-A515-005083D7D699",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r7:*:*:*:*:*:*:*",
"matchCriteriaId": "38B7AEE2-BAA4-4FDA-A627-F5A7370D2C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r8:*:*:*:*:*:*:*",
"matchCriteriaId": "3BCB5149-8C43-42A2-A9B2-541802FBE5B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r9:*:*:*:*:*:*:*",
"matchCriteriaId": "2C3A3552-2D77-494E-902E-9529AA2074D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r10:*:*:*:*:*:*:*",
"matchCriteriaId": "BD90D085-60F7-4B3F-8C82-B9F362EFFB89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "627A41F5-BE3C-41AD-B455-0D73BE5CA010",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7D41144E-9F64-4919-87DA-09092AA2030A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r1:*:*:*:*:*:*:*",
"matchCriteriaId": "F85BBA70-D185-4A84-8D66-2D3ACE336C6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r2:*:*:*:*:*:*:*",
"matchCriteriaId": "D0F6E761-1941-4B9F-98DC-1EED40B851A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r3:*:*:*:*:*:*:*",
"matchCriteriaId": "3A3720A8-B042-4366-A4F2-2262CDD0CAF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r4:*:*:*:*:*:*:*",
"matchCriteriaId": "66AEC6EE-F483-4156-91DB-E939B45D09E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4F4B1021-40CB-4A11-9650-F1BDBD6943D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet."
}
],
"id": "CVE-2004-1446",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2004-12-31T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://secunia.com/advisories/12208/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.juniper.net/support/security/alerts/screenos-sshv1-2.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/749870"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/10854"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16876"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://secunia.com/advisories/12208/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.juniper.net/support/security/alerts/screenos-sshv1-2.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/749870"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/10854"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16876"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2002-1547
Vulnerability from fkie_nvd - Published: 2003-03-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Netscreen running ScreenOS 4.0.0r6 and earlier allows remote attackers to cause a denial of service via a malformed SSH packet to the Secure Command Shell (SCS) management interface, as demonstrated via certain CRC32 exploits, a different vulnerability than CVE-2001-0144.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| juniper | netscreen_screenos | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "02A54FB8-ABC1-4A86-AD19-94BBB0BB4922",
"versionEndIncluding": "4.0.0r6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Netscreen running ScreenOS 4.0.0r6 and earlier allows remote attackers to cause a denial of service via a malformed SSH packet to the Secure Command Shell (SCS) management interface, as demonstrated via certain CRC32 exploits, a different vulnerability than CVE-2001-0144."
}
],
"id": "CVE-2002-1547",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2003-03-31T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0443.html"
},
{
"source": "cve@mitre.org",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0446.html"
},
{
"source": "cve@mitre.org",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0053.html"
},
{
"source": "cve@mitre.org",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0054.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.iss.net/security_center/static/10528.php"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/930161"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.netscreen.com/support/alerts/11_06_02.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/4376"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0443.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0446.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0053.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0054.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.iss.net/security_center/static/10528.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/930161"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.netscreen.com/support/alerts/11_06_02.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/4376"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2002-2150
Vulnerability from fkie_nvd - Published: 2002-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Firewalls from multiple vendors empty state tables more slowly than they are filled, which allows remote attackers to flood state tables with packet flooding attacks such as (1) TCP SYN flood, (2) UDP flood, or (3) Crikey CRC Flood, which causes the firewall to refuse any new connections.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.iss.net/security_center/static/10449.php | ||
| cve@mitre.org | http://www.kb.cert.org/vuls/id/539363 | Third Party Advisory, US Government Resource | |
| cve@mitre.org | http://www.securityfocus.com/bid/6023 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/10449.php | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/539363 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/6023 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| juniper | netscreen_screenos | 2.7.1 | |
| juniper | netscreen_screenos | 2.7.1r1 | |
| juniper | netscreen_screenos | 2.7.1r2 | |
| juniper | netscreen_screenos | 2.7.1r3 | |
| juniper | netscreen_screenos | 2.10_r3 | |
| juniper | netscreen_screenos | 2.10_r4 | |
| juniper | netscreen_screenos | 3.0.1r1 | |
| juniper | netscreen_screenos | 3.0.1r2 | |
| juniper | netscreen_screenos | 3.0.3_r1.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE7F646-B716-47D7-84E8-CA875A85C983",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA96638D-AD5F-4EFD-983B-181DCCF3EAE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r2:*:*:*:*:*:*:*",
"matchCriteriaId": "2E30F9B6-24EB-44FB-9E73-5DD480A48CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r3:*:*:*:*:*:*:*",
"matchCriteriaId": "B1648D07-823B-4BF9-87EC-DB34797B5B5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r3:*:*:*:*:*:*:*",
"matchCriteriaId": "47DE8E73-0F1B-42E4-9BD6-7F5066D7330B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r4:*:*:*:*:*:*:*",
"matchCriteriaId": "057B0387-44C0-45BE-9D91-D5A01C9D8020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r1:*:*:*:*:*:*:*",
"matchCriteriaId": "D53868A9-67B6-40AD-B4F0-6911F1D2FC6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r2:*:*:*:*:*:*:*",
"matchCriteriaId": "8AA52D22-A0D6-413A-9F49-0452356D2BE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3_r1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "05578911-51E3-447B-98B6-083D3F35E8F1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Firewalls from multiple vendors empty state tables more slowly than they are filled, which allows remote attackers to flood state tables with packet flooding attacks such as (1) TCP SYN flood, (2) UDP flood, or (3) Crikey CRC Flood, which causes the firewall to refuse any new connections."
}
],
"id": "CVE-2002-2150",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2002-12-31T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.iss.net/security_center/static/10449.php"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/539363"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/6023"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.iss.net/security_center/static/10449.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/539363"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/6023"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2002-0891
Vulnerability from fkie_nvd - Published: 2002-10-04 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
The web interface (WebUI) of NetScreen ScreenOS before 2.6.1r8, and certain 2.8.x and 3.0.x versions before 3.0.3r1, allows remote attackers to cause a denial of service (crash) via a long user name.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| juniper | netscreen_screenos | 2.5 | |
| juniper | netscreen_screenos | 2.5r1 | |
| juniper | netscreen_screenos | 2.5r2 | |
| juniper | netscreen_screenos | 2.5r6 | |
| juniper | netscreen_screenos | 2.6.1 | |
| juniper | netscreen_screenos | 2.6.1r1 | |
| juniper | netscreen_screenos | 2.6.1r2 | |
| juniper | netscreen_screenos | 2.6.1r3 | |
| juniper | netscreen_screenos | 2.6.1r4 | |
| juniper | netscreen_screenos | 2.6.1r5 | |
| juniper | netscreen_screenos | 2.7.1 | |
| juniper | netscreen_screenos | 2.7.1r1 | |
| juniper | netscreen_screenos | 2.7.1r2 | |
| juniper | netscreen_screenos | 2.7.1r3 | |
| juniper | netscreen_screenos | 2.8_r1 | |
| juniper | netscreen_screenos | 2.10_r3 | |
| juniper | netscreen_screenos | 2.10_r4 | |
| juniper | netscreen_screenos | 3.0.0 | |
| juniper | netscreen_screenos | 3.0.0r1 | |
| juniper | netscreen_screenos | 3.0.0r2 | |
| juniper | netscreen_screenos | 3.0.0r3 | |
| juniper | netscreen_screenos | 3.0.0r4 | |
| juniper | netscreen_screenos | 3.0.1r1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4D38841C-DF2D-41D8-BD15-EBBB9E9D83E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5r1:*:*:*:*:*:*:*",
"matchCriteriaId": "DDDBDBE1-E16B-4F03-9072-8B28E9467FED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5r2:*:*:*:*:*:*:*",
"matchCriteriaId": "4E099835-7C70-44F1-9E2B-07AF5B3C0577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5r6:*:*:*:*:*:*:*",
"matchCriteriaId": "D10CDE09-1896-4E99-B2A0-93F89164225A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2F43896A-2EF6-4069-8B81-815E4C232C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A7DFAB9-4D4D-4179-9DC4-F654D6E2DAB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r2:*:*:*:*:*:*:*",
"matchCriteriaId": "26EC0CE2-5A5C-44ED-A423-CC20B7FFE22F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r3:*:*:*:*:*:*:*",
"matchCriteriaId": "E2BD48EE-C23B-412C-895D-F58CD81FC673",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r4:*:*:*:*:*:*:*",
"matchCriteriaId": "D7A6CA51-F121-44F7-80D1-CF38261D299C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r5:*:*:*:*:*:*:*",
"matchCriteriaId": "B5064E9A-677E-418E-91A7-2DB686B662DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE7F646-B716-47D7-84E8-CA875A85C983",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA96638D-AD5F-4EFD-983B-181DCCF3EAE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r2:*:*:*:*:*:*:*",
"matchCriteriaId": "2E30F9B6-24EB-44FB-9E73-5DD480A48CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r3:*:*:*:*:*:*:*",
"matchCriteriaId": "B1648D07-823B-4BF9-87EC-DB34797B5B5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.8_r1:*:*:*:*:*:*:*",
"matchCriteriaId": "B33B8346-B753-443F-BB24-74FF6C55340B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r3:*:*:*:*:*:*:*",
"matchCriteriaId": "47DE8E73-0F1B-42E4-9BD6-7F5066D7330B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r4:*:*:*:*:*:*:*",
"matchCriteriaId": "057B0387-44C0-45BE-9D91-D5A01C9D8020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "28EB52A7-E8EC-46AA-A3F5-81BFA01666D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r1:*:*:*:*:*:*:*",
"matchCriteriaId": "A25881AB-69D0-46E5-A502-C65933A457B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r2:*:*:*:*:*:*:*",
"matchCriteriaId": "B14314AE-812D-4654-B6CE-43917A1F0542",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r3:*:*:*:*:*:*:*",
"matchCriteriaId": "20F7E636-40E0-45CC-A39E-C8BDF9CFBE6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r4:*:*:*:*:*:*:*",
"matchCriteriaId": "463EC9BA-B241-45D6-AB89-53EB8156E40F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r1:*:*:*:*:*:*:*",
"matchCriteriaId": "D53868A9-67B6-40AD-B4F0-6911F1D2FC6E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The web interface (WebUI) of NetScreen ScreenOS before 2.6.1r8, and certain 2.8.x and 3.0.x versions before 3.0.3r1, allows remote attackers to cause a denial of service (crash) via a long user name."
},
{
"lang": "es",
"value": "El Interfaz web (WebUI) de NetScreen ScreenOS desde la 2.6.1r8 a la anterior a la 3.1.0r1 permite a atacantes remotos causar la Denegaci\u00f3n de Servicios (por caida), mediante un nombre largo de usuario."
}
],
"id": "CVE-2002-0891",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2002-10-04T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://online.securityfocus.com/archive/1/274240"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.iss.net/security_center/static/9186.php"
},
{
"source": "cve@mitre.org",
"url": "http://www.netscreen.com/support/ns25_reboot.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/4842"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://online.securityfocus.com/archive/1/274240"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.iss.net/security_center/static/9186.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.netscreen.com/support/ns25_reboot.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/4842"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2002-0234
Vulnerability from fkie_nvd - Published: 2002-05-29 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
NetScreen ScreenOS before 2.6.1 does not support a maximum number of concurrent sessions for a system, which allows an attacker on the trusted network to cause a denial of service (resource exhaustion) via a port scan to an external network, which consumes all available connections.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| juniper | netscreen_screenos | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "357A2EA6-A0F0-4968-AA45-E45A3D109358",
"versionEndIncluding": "2.6.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NetScreen ScreenOS before 2.6.1 does not support a maximum number of concurrent sessions for a system, which allows an attacker on the trusted network to cause a denial of service (resource exhaustion) via a port scan to an external network, which consumes all available connections."
},
{
"lang": "es",
"value": "NetScreen ScreenOS anteriores a 2.6.1 no soporta el establecimiento de un n\u00famero m\u00e1ximo de sesiones concurrentes para un sistema, lo que permite a un atacante en la red de confianza causar una denegaci\u00f3n de servicio (agotamiento de recursos) mediante un escaneo de puertos a una red externa, lo que consume todas las conexiones disponibles."
}
],
"id": "CVE-2002-0234",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2002-05-29T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=101258281818524\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=101258887105690\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://online.securityfocus.com/archive/1/254268"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.iss.net/security_center/static/8057.php"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/4015"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=101258281818524\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=101258887105690\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://online.securityfocus.com/archive/1/254268"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.iss.net/security_center/static/8057.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/4015"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2001-0589
Vulnerability from fkie_nvd - Published: 2001-08-22 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
NetScreen ScreenOS prior to 2.5r6 on the NetScreen-10 and Netscreen-100 can allow a local attacker to bypass the DMZ 'denial' policy via specific traffic patterns.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| juniper | netscreen_screenos | 1.64 | |
| juniper | netscreen_screenos | 1.66 | |
| juniper | netscreen_screenos | 2.1 | |
| juniper | netscreen_screenos | 2.5 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.64:*:*:*:*:*:*:*",
"matchCriteriaId": "74187E80-0EDA-4FE7-A113-FCB723AF08B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.66:*:*:*:*:*:*:*",
"matchCriteriaId": "0D6691BE-2591-495A-BB72-2DA9956944A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD0131A-D07C-4B23-8CEC-E7CF659DB55E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4D38841C-DF2D-41D8-BD15-EBBB9E9D83E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NetScreen ScreenOS prior to 2.5r6 on the NetScreen-10 and Netscreen-100 can allow a local attacker to bypass the DMZ \u0027denial\u0027 policy via specific traffic patterns."
}
],
"id": "CVE-2001-0589",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2001-08-22T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0375.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/1780"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/2523"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6317"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0375.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/1780"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.securityfocus.com/bid/2523"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6317"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2018-0059 (GCVE-0-2018-0059)
Vulnerability from cvelistv5 – Published: 2018-10-10 18:00 – Updated: 2024-09-16 18:24
VLAI?
Summary
A persistent cross-site scripting vulnerability in the graphical user interface of ScreenOS may allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. Affected releases are Juniper Networks ScreenOS 6.3.0 versions prior to 6.3.0r26.
Severity ?
5.4 (Medium)
CWE
- Stored cross-site scripting
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Juniper Networks | ScreenOS |
Affected:
6.3.0 , < 6.3.0r26
(custom)
|
Credits
Marcel Bilal from IT-Dienstleistungszentrum Berlin
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T03:14:16.065Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.juniper.net/JSA10894"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "ScreenOS",
"vendor": "Juniper Networks",
"versions": [
{
"lessThan": "6.3.0r26",
"status": "affected",
"version": "6.3.0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Marcel Bilal from IT-Dienstleistungszentrum Berlin"
}
],
"datePublic": "2018-10-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A persistent cross-site scripting vulnerability in the graphical user interface of ScreenOS may allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. Affected releases are Juniper Networks ScreenOS 6.3.0 versions prior to 6.3.0r26."
}
],
"exploits": [
{
"lang": "en",
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Stored cross-site scripting",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-10T17:57:01",
"orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
"shortName": "juniper"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.juniper.net/JSA10894"
}
],
"solutions": [
{
"lang": "en",
"value": "The following software releases have been updated to resolve this specific issue: ScreenOS 6.3.0r26 and all subsequent releases.\n\nReview and clear any previously stored cross-site scripting entries."
}
],
"source": {
"advisory": "JSA10894",
"defect": [
"1323345"
],
"discovery": "EXTERNAL"
},
"title": "ScreenOS: Stored Cross-Site Scripting (XSS) vulnerability",
"workarounds": [
{
"lang": "en",
"value": "Use access lists or firewall filters to limit access to the device only from trusted hosts and administrators.\n\nIn addition to the recommendations listed above, it is good security practice to limit the exploitable attack surface of critical infrastructure networking equipment. Use access lists or firewall filters to limit access to the device only from trusted, administrative networks or hosts."
},
{
"lang": "en",
"value": "Disable the web administrative interface if it is not necessary."
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2018-10-10T16:00:00.000Z",
"ID": "CVE-2018-0059",
"STATE": "PUBLIC",
"TITLE": "ScreenOS: Stored Cross-Site Scripting (XSS) vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ScreenOS",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_name": "6.3.0",
"version_value": "6.3.0r26"
}
]
}
}
]
},
"vendor_name": "Juniper Networks"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Marcel Bilal from IT-Dienstleistungszentrum Berlin"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A persistent cross-site scripting vulnerability in the graphical user interface of ScreenOS may allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. Affected releases are Juniper Networks ScreenOS 6.3.0 versions prior to 6.3.0r26."
}
]
},
"exploit": [
{
"lang": "en",
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Stored cross-site scripting"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.juniper.net/JSA10894",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/JSA10894"
}
]
},
"solution": [
{
"lang": "en",
"value": "The following software releases have been updated to resolve this specific issue: ScreenOS 6.3.0r26 and all subsequent releases.\n\nReview and clear any previously stored cross-site scripting entries."
}
],
"source": {
"advisory": "JSA10894",
"defect": [
"1323345"
],
"discovery": "EXTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "Use access lists or firewall filters to limit access to the device only from trusted hosts and administrators.\n\nIn addition to the recommendations listed above, it is good security practice to limit the exploitable attack surface of critical infrastructure networking equipment. Use access lists or firewall filters to limit access to the device only from trusted, administrative networks or hosts."
},
{
"lang": "en",
"value": "Disable the web administrative interface if it is not necessary."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
"assignerShortName": "juniper",
"cveId": "CVE-2018-0059",
"datePublished": "2018-10-10T18:00:00Z",
"dateReserved": "2017-11-16T00:00:00",
"dateUpdated": "2024-09-16T18:24:49.920Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-6096 (GCVE-0-2008-6096)
Vulnerability from cvelistv5 – Published: 2009-02-09 17:00 – Updated: 2024-08-07 11:20
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T11:20:25.150Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "31528",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/31528"
},
{
"name": "ADV-2008-2713",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2713"
},
{
"name": "32078",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32078"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.layereddefense.com/netscreen01oct.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-10-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-02-26T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "31528",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/31528"
},
{
"name": "ADV-2008-2713",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2713"
},
{
"name": "32078",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32078"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.layereddefense.com/netscreen01oct.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-6096",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "31528",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31528"
},
{
"name": "ADV-2008-2713",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2713"
},
{
"name": "32078",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32078"
},
{
"name": "http://www.layereddefense.com/netscreen01oct.html",
"refsource": "MISC",
"url": "http://www.layereddefense.com/netscreen01oct.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-6096",
"datePublished": "2009-02-09T17:00:00",
"dateReserved": "2009-02-09T00:00:00",
"dateUpdated": "2024-08-07T11:20:25.150Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-2150 (GCVE-0-2002-2150)
Vulnerability from cvelistv5 – Published: 2005-11-16 21:17 – Updated: 2024-09-16 17:23
VLAI?
Summary
Firewalls from multiple vendors empty state tables more slowly than they are filled, which allows remote attackers to flood state tables with packet flooding attacks such as (1) TCP SYN flood, (2) UDP flood, or (3) Crikey CRC Flood, which causes the firewall to refuse any new connections.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:51:17.599Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "6023",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/6023"
},
{
"name": "VU#539363",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/539363"
},
{
"name": "firewall-state-table-dos(10449)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/10449.php"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Firewalls from multiple vendors empty state tables more slowly than they are filled, which allows remote attackers to flood state tables with packet flooding attacks such as (1) TCP SYN flood, (2) UDP flood, or (3) Crikey CRC Flood, which causes the firewall to refuse any new connections."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-11-16T21:17:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "6023",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/6023"
},
{
"name": "VU#539363",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/539363"
},
{
"name": "firewall-state-table-dos(10449)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/10449.php"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-2150",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Firewalls from multiple vendors empty state tables more slowly than they are filled, which allows remote attackers to flood state tables with packet flooding attacks such as (1) TCP SYN flood, (2) UDP flood, or (3) Crikey CRC Flood, which causes the firewall to refuse any new connections."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "6023",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6023"
},
{
"name": "VU#539363",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/539363"
},
{
"name": "firewall-state-table-dos(10449)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/10449.php"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-2150",
"datePublished": "2005-11-16T21:17:00Z",
"dateReserved": "2005-11-16T00:00:00Z",
"dateUpdated": "2024-09-16T17:23:11.675Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-2640 (GCVE-0-2005-2640)
Vulnerability from cvelistv5 – Published: 2005-08-20 04:00 – Updated: 2024-08-07 22:45
VLAI?
Summary
Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T22:45:01.317Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "14595",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/14595"
},
{
"name": "20050818 Juniper Netscreen VPN Username Enumeration Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm"
},
{
"name": "1014728",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1014728"
},
{
"name": "16474",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/16474/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-08-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-10-17T13:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "14595",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/14595"
},
{
"name": "20050818 Juniper Netscreen VPN Username Enumeration Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm"
},
{
"name": "1014728",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1014728"
},
{
"name": "16474",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/16474/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-2640",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "14595",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14595"
},
{
"name": "20050818 Juniper Netscreen VPN Username Enumeration Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2"
},
{
"name": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm",
"refsource": "MISC",
"url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm"
},
{
"name": "1014728",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014728"
},
{
"name": "16474",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16474/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-2640",
"datePublished": "2005-08-20T04:00:00",
"dateReserved": "2005-08-20T00:00:00",
"dateUpdated": "2024-08-07T22:45:01.317Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-1446 (GCVE-0-2004-1446)
Vulnerability from cvelistv5 – Published: 2005-02-13 05:00 – Updated: 2024-08-08 00:53
VLAI?
Summary
Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T00:53:24.130Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#749870",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/749870"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.juniper.net/support/security/alerts/screenos-sshv1-2.txt"
},
{
"name": "10854",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/10854"
},
{
"name": "netscreen-screenos-sshv1-dos(16876)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16876"
},
{
"name": "12208",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/12208/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-08-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "VU#749870",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/749870"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.juniper.net/support/security/alerts/screenos-sshv1-2.txt"
},
{
"name": "10854",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/10854"
},
{
"name": "netscreen-screenos-sshv1-dos(16876)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16876"
},
{
"name": "12208",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/12208/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-1446",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#749870",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/749870"
},
{
"name": "http://www.juniper.net/support/security/alerts/screenos-sshv1-2.txt",
"refsource": "CONFIRM",
"url": "http://www.juniper.net/support/security/alerts/screenos-sshv1-2.txt"
},
{
"name": "10854",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10854"
},
{
"name": "netscreen-screenos-sshv1-dos(16876)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16876"
},
{
"name": "12208",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/12208/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-1446",
"datePublished": "2005-02-13T05:00:00",
"dateReserved": "2005-02-13T00:00:00",
"dateUpdated": "2024-08-08T00:53:24.130Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-1547 (GCVE-0-2002-1547)
Vulnerability from cvelistv5 – Published: 2004-09-01 04:00 – Updated: 2024-08-08 03:26
VLAI?
Summary
Netscreen running ScreenOS 4.0.0r6 and earlier allows remote attackers to cause a denial of service via a malformed SSH packet to the Secure Command Shell (SCS) management interface, as demonstrated via certain CRC32 exploits, a different vulnerability than CVE-2001-0144.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:26:28.860Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "netscreen-ssh-dos(10528)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/10528.php"
},
{
"name": "20021101 Netscreen SSH1 CRC32 Compensation Denial of service",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0443.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.netscreen.com/support/alerts/11_06_02.html"
},
{
"name": "4376",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/4376"
},
{
"name": "20021101 Netscreen SSH1 CRC32 Compensation Denial of service",
"tags": [
"mailing-list",
"x_refsource_VULNWATCH",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0053.html"
},
{
"name": "VU#930161",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/930161"
},
{
"name": "20021101 (Correction) Netscreen SSH1 CRC32 Compensation Denial of service",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0446.html"
},
{
"name": "20021101 (Correction) Netscreen SSH1 CRC32 Compensation Denial of service",
"tags": [
"mailing-list",
"x_refsource_VULNWATCH",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0054.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-11-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Netscreen running ScreenOS 4.0.0r6 and earlier allows remote attackers to cause a denial of service via a malformed SSH packet to the Secure Command Shell (SCS) management interface, as demonstrated via certain CRC32 exploits, a different vulnerability than CVE-2001-0144."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2004-08-18T00:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "netscreen-ssh-dos(10528)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/10528.php"
},
{
"name": "20021101 Netscreen SSH1 CRC32 Compensation Denial of service",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0443.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.netscreen.com/support/alerts/11_06_02.html"
},
{
"name": "4376",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/4376"
},
{
"name": "20021101 Netscreen SSH1 CRC32 Compensation Denial of service",
"tags": [
"mailing-list",
"x_refsource_VULNWATCH"
],
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0053.html"
},
{
"name": "VU#930161",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/930161"
},
{
"name": "20021101 (Correction) Netscreen SSH1 CRC32 Compensation Denial of service",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0446.html"
},
{
"name": "20021101 (Correction) Netscreen SSH1 CRC32 Compensation Denial of service",
"tags": [
"mailing-list",
"x_refsource_VULNWATCH"
],
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0054.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-1547",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Netscreen running ScreenOS 4.0.0r6 and earlier allows remote attackers to cause a denial of service via a malformed SSH packet to the Secure Command Shell (SCS) management interface, as demonstrated via certain CRC32 exploits, a different vulnerability than CVE-2001-0144."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "netscreen-ssh-dos(10528)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/10528.php"
},
{
"name": "20021101 Netscreen SSH1 CRC32 Compensation Denial of service",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0443.html"
},
{
"name": "http://www.netscreen.com/support/alerts/11_06_02.html",
"refsource": "CONFIRM",
"url": "http://www.netscreen.com/support/alerts/11_06_02.html"
},
{
"name": "4376",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/4376"
},
{
"name": "20021101 Netscreen SSH1 CRC32 Compensation Denial of service",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0053.html"
},
{
"name": "VU#930161",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/930161"
},
{
"name": "20021101 (Correction) Netscreen SSH1 CRC32 Compensation Denial of service",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0446.html"
},
{
"name": "20021101 (Correction) Netscreen SSH1 CRC32 Compensation Denial of service",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0054.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-1547",
"datePublished": "2004-09-01T04:00:00",
"dateReserved": "2003-03-04T00:00:00",
"dateUpdated": "2024-08-08T03:26:28.860Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-0891 (GCVE-0-2002-0891)
Vulnerability from cvelistv5 – Published: 2003-04-02 05:00 – Updated: 2024-08-08 03:03
VLAI?
Summary
The web interface (WebUI) of NetScreen ScreenOS before 2.6.1r8, and certain 2.8.x and 3.0.x versions before 3.0.3r1, allows remote attackers to cause a denial of service (crash) via a long user name.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:03:49.519Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "netscreen-screenos-username-dos(9186)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/9186.php"
},
{
"name": "4842",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/4842"
},
{
"name": "20020527 Netscreen 25 unauthorised reboot issue",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://online.securityfocus.com/archive/1/274240"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.netscreen.com/support/ns25_reboot.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-05-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The web interface (WebUI) of NetScreen ScreenOS before 2.6.1r8, and certain 2.8.x and 3.0.x versions before 3.0.3r1, allows remote attackers to cause a denial of service (crash) via a long user name."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-09-10T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "netscreen-screenos-username-dos(9186)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/9186.php"
},
{
"name": "4842",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/4842"
},
{
"name": "20020527 Netscreen 25 unauthorised reboot issue",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://online.securityfocus.com/archive/1/274240"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.netscreen.com/support/ns25_reboot.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0891",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The web interface (WebUI) of NetScreen ScreenOS before 2.6.1r8, and certain 2.8.x and 3.0.x versions before 3.0.3r1, allows remote attackers to cause a denial of service (crash) via a long user name."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "netscreen-screenos-username-dos(9186)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9186.php"
},
{
"name": "4842",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4842"
},
{
"name": "20020527 Netscreen 25 unauthorised reboot issue",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/274240"
},
{
"name": "http://www.netscreen.com/support/ns25_reboot.html",
"refsource": "CONFIRM",
"url": "http://www.netscreen.com/support/ns25_reboot.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0891",
"datePublished": "2003-04-02T05:00:00",
"dateReserved": "2002-08-16T00:00:00",
"dateUpdated": "2024-08-08T03:03:49.519Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-0234 (GCVE-0-2002-0234)
Vulnerability from cvelistv5 – Published: 2002-05-03 04:00 – Updated: 2024-08-08 02:42
VLAI?
Summary
NetScreen ScreenOS before 2.6.1 does not support a maximum number of concurrent sessions for a system, which allows an attacker on the trusted network to cause a denial of service (resource exhaustion) via a port scan to an external network, which consumes all available connections.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:42:28.525Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20020201 RE: NetScreen ScreenOS 2.6 Subject to Trust Interface DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101258887105690\u0026w=2"
},
{
"name": "20020201 NetScreen ScreenOS 2.6 Subject to Trust Interface DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101258281818524\u0026w=2"
},
{
"name": "20020205 NetScreen Response to ScreenOS Port Scan DoS Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://online.securityfocus.com/archive/1/254268"
},
{
"name": "netscreen-screenos-scan-dos(8057)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/8057.php"
},
{
"name": "4015",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/4015"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-02-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "NetScreen ScreenOS before 2.6.1 does not support a maximum number of concurrent sessions for a system, which allows an attacker on the trusted network to cause a denial of service (resource exhaustion) via a port scan to an external network, which consumes all available connections."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-10-17T13:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20020201 RE: NetScreen ScreenOS 2.6 Subject to Trust Interface DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101258887105690\u0026w=2"
},
{
"name": "20020201 NetScreen ScreenOS 2.6 Subject to Trust Interface DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101258281818524\u0026w=2"
},
{
"name": "20020205 NetScreen Response to ScreenOS Port Scan DoS Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://online.securityfocus.com/archive/1/254268"
},
{
"name": "netscreen-screenos-scan-dos(8057)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/8057.php"
},
{
"name": "4015",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/4015"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0234",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NetScreen ScreenOS before 2.6.1 does not support a maximum number of concurrent sessions for a system, which allows an attacker on the trusted network to cause a denial of service (resource exhaustion) via a port scan to an external network, which consumes all available connections."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20020201 RE: NetScreen ScreenOS 2.6 Subject to Trust Interface DoS",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=101258887105690\u0026w=2"
},
{
"name": "20020201 NetScreen ScreenOS 2.6 Subject to Trust Interface DoS",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=101258281818524\u0026w=2"
},
{
"name": "20020205 NetScreen Response to ScreenOS Port Scan DoS Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/254268"
},
{
"name": "netscreen-screenos-scan-dos(8057)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/8057.php"
},
{
"name": "4015",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4015"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0234",
"datePublished": "2002-05-03T04:00:00",
"dateReserved": "2002-05-01T00:00:00",
"dateUpdated": "2024-08-08T02:42:28.525Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2001-0589 (GCVE-0-2001-0589)
Vulnerability from cvelistv5 – Published: 2002-03-09 05:00 – Updated: 2024-08-08 04:30
VLAI?
Summary
NetScreen ScreenOS prior to 2.5r6 on the NetScreen-10 and Netscreen-100 can allow a local attacker to bypass the DMZ 'denial' policy via specific traffic patterns.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T04:30:04.842Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "netscreen-screenos-bypass-firewall(6317)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6317"
},
{
"name": "1780",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/1780"
},
{
"name": "2523",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/2523"
},
{
"name": "20010326 Netscreen: DMZ Network Receives Some \"Denied\" Traffic",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0375.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2001-03-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "NetScreen ScreenOS prior to 2.5r6 on the NetScreen-10 and Netscreen-100 can allow a local attacker to bypass the DMZ \u0027denial\u0027 policy via specific traffic patterns."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-03-01T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "netscreen-screenos-bypass-firewall(6317)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6317"
},
{
"name": "1780",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/1780"
},
{
"name": "2523",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/2523"
},
{
"name": "20010326 Netscreen: DMZ Network Receives Some \"Denied\" Traffic",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0375.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2001-0589",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NetScreen ScreenOS prior to 2.5r6 on the NetScreen-10 and Netscreen-100 can allow a local attacker to bypass the DMZ \u0027denial\u0027 policy via specific traffic patterns."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "netscreen-screenos-bypass-firewall(6317)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6317"
},
{
"name": "1780",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/1780"
},
{
"name": "2523",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2523"
},
{
"name": "20010326 Netscreen: DMZ Network Receives Some \"Denied\" Traffic",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0375.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2001-0589",
"datePublished": "2002-03-09T05:00:00",
"dateReserved": "2001-07-27T00:00:00",
"dateUpdated": "2024-08-08T04:30:04.842Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-0059 (GCVE-0-2018-0059)
Vulnerability from nvd – Published: 2018-10-10 18:00 – Updated: 2024-09-16 18:24
VLAI?
Summary
A persistent cross-site scripting vulnerability in the graphical user interface of ScreenOS may allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. Affected releases are Juniper Networks ScreenOS 6.3.0 versions prior to 6.3.0r26.
Severity ?
5.4 (Medium)
CWE
- Stored cross-site scripting
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Juniper Networks | ScreenOS |
Affected:
6.3.0 , < 6.3.0r26
(custom)
|
Credits
Marcel Bilal from IT-Dienstleistungszentrum Berlin
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T03:14:16.065Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.juniper.net/JSA10894"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "ScreenOS",
"vendor": "Juniper Networks",
"versions": [
{
"lessThan": "6.3.0r26",
"status": "affected",
"version": "6.3.0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Marcel Bilal from IT-Dienstleistungszentrum Berlin"
}
],
"datePublic": "2018-10-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A persistent cross-site scripting vulnerability in the graphical user interface of ScreenOS may allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. Affected releases are Juniper Networks ScreenOS 6.3.0 versions prior to 6.3.0r26."
}
],
"exploits": [
{
"lang": "en",
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Stored cross-site scripting",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-10T17:57:01",
"orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
"shortName": "juniper"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.juniper.net/JSA10894"
}
],
"solutions": [
{
"lang": "en",
"value": "The following software releases have been updated to resolve this specific issue: ScreenOS 6.3.0r26 and all subsequent releases.\n\nReview and clear any previously stored cross-site scripting entries."
}
],
"source": {
"advisory": "JSA10894",
"defect": [
"1323345"
],
"discovery": "EXTERNAL"
},
"title": "ScreenOS: Stored Cross-Site Scripting (XSS) vulnerability",
"workarounds": [
{
"lang": "en",
"value": "Use access lists or firewall filters to limit access to the device only from trusted hosts and administrators.\n\nIn addition to the recommendations listed above, it is good security practice to limit the exploitable attack surface of critical infrastructure networking equipment. Use access lists or firewall filters to limit access to the device only from trusted, administrative networks or hosts."
},
{
"lang": "en",
"value": "Disable the web administrative interface if it is not necessary."
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "sirt@juniper.net",
"DATE_PUBLIC": "2018-10-10T16:00:00.000Z",
"ID": "CVE-2018-0059",
"STATE": "PUBLIC",
"TITLE": "ScreenOS: Stored Cross-Site Scripting (XSS) vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ScreenOS",
"version": {
"version_data": [
{
"affected": "\u003c",
"version_affected": "\u003c",
"version_name": "6.3.0",
"version_value": "6.3.0r26"
}
]
}
}
]
},
"vendor_name": "Juniper Networks"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Marcel Bilal from IT-Dienstleistungszentrum Berlin"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A persistent cross-site scripting vulnerability in the graphical user interface of ScreenOS may allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. Affected releases are Juniper Networks ScreenOS 6.3.0 versions prior to 6.3.0r26."
}
]
},
"exploit": [
{
"lang": "en",
"value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."
}
],
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Stored cross-site scripting"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.juniper.net/JSA10894",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/JSA10894"
}
]
},
"solution": [
{
"lang": "en",
"value": "The following software releases have been updated to resolve this specific issue: ScreenOS 6.3.0r26 and all subsequent releases.\n\nReview and clear any previously stored cross-site scripting entries."
}
],
"source": {
"advisory": "JSA10894",
"defect": [
"1323345"
],
"discovery": "EXTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "Use access lists or firewall filters to limit access to the device only from trusted hosts and administrators.\n\nIn addition to the recommendations listed above, it is good security practice to limit the exploitable attack surface of critical infrastructure networking equipment. Use access lists or firewall filters to limit access to the device only from trusted, administrative networks or hosts."
},
{
"lang": "en",
"value": "Disable the web administrative interface if it is not necessary."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968",
"assignerShortName": "juniper",
"cveId": "CVE-2018-0059",
"datePublished": "2018-10-10T18:00:00Z",
"dateReserved": "2017-11-16T00:00:00",
"dateUpdated": "2024-09-16T18:24:49.920Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-6096 (GCVE-0-2008-6096)
Vulnerability from nvd – Published: 2009-02-09 17:00 – Updated: 2024-08-07 11:20
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T11:20:25.150Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "31528",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/31528"
},
{
"name": "ADV-2008-2713",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2713"
},
{
"name": "32078",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32078"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.layereddefense.com/netscreen01oct.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-10-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-02-26T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "31528",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/31528"
},
{
"name": "ADV-2008-2713",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2713"
},
{
"name": "32078",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32078"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.layereddefense.com/netscreen01oct.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-6096",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "31528",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/31528"
},
{
"name": "ADV-2008-2713",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2713"
},
{
"name": "32078",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32078"
},
{
"name": "http://www.layereddefense.com/netscreen01oct.html",
"refsource": "MISC",
"url": "http://www.layereddefense.com/netscreen01oct.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-6096",
"datePublished": "2009-02-09T17:00:00",
"dateReserved": "2009-02-09T00:00:00",
"dateUpdated": "2024-08-07T11:20:25.150Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-2150 (GCVE-0-2002-2150)
Vulnerability from nvd – Published: 2005-11-16 21:17 – Updated: 2024-09-16 17:23
VLAI?
Summary
Firewalls from multiple vendors empty state tables more slowly than they are filled, which allows remote attackers to flood state tables with packet flooding attacks such as (1) TCP SYN flood, (2) UDP flood, or (3) Crikey CRC Flood, which causes the firewall to refuse any new connections.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:51:17.599Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "6023",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/6023"
},
{
"name": "VU#539363",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/539363"
},
{
"name": "firewall-state-table-dos(10449)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/10449.php"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Firewalls from multiple vendors empty state tables more slowly than they are filled, which allows remote attackers to flood state tables with packet flooding attacks such as (1) TCP SYN flood, (2) UDP flood, or (3) Crikey CRC Flood, which causes the firewall to refuse any new connections."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-11-16T21:17:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "6023",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/6023"
},
{
"name": "VU#539363",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/539363"
},
{
"name": "firewall-state-table-dos(10449)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/10449.php"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-2150",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Firewalls from multiple vendors empty state tables more slowly than they are filled, which allows remote attackers to flood state tables with packet flooding attacks such as (1) TCP SYN flood, (2) UDP flood, or (3) Crikey CRC Flood, which causes the firewall to refuse any new connections."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "6023",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/6023"
},
{
"name": "VU#539363",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/539363"
},
{
"name": "firewall-state-table-dos(10449)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/10449.php"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-2150",
"datePublished": "2005-11-16T21:17:00Z",
"dateReserved": "2005-11-16T00:00:00Z",
"dateUpdated": "2024-09-16T17:23:11.675Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-2640 (GCVE-0-2005-2640)
Vulnerability from nvd – Published: 2005-08-20 04:00 – Updated: 2024-08-07 22:45
VLAI?
Summary
Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T22:45:01.317Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "14595",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/14595"
},
{
"name": "20050818 Juniper Netscreen VPN Username Enumeration Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm"
},
{
"name": "1014728",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1014728"
},
{
"name": "16474",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/16474/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-08-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-10-17T13:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "14595",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/14595"
},
{
"name": "20050818 Juniper Netscreen VPN Username Enumeration Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm"
},
{
"name": "1014728",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1014728"
},
{
"name": "16474",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/16474/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-2640",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "14595",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/14595"
},
{
"name": "20050818 Juniper Netscreen VPN Username Enumeration Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2"
},
{
"name": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm",
"refsource": "MISC",
"url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm"
},
{
"name": "1014728",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1014728"
},
{
"name": "16474",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/16474/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-2640",
"datePublished": "2005-08-20T04:00:00",
"dateReserved": "2005-08-20T00:00:00",
"dateUpdated": "2024-08-07T22:45:01.317Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-1446 (GCVE-0-2004-1446)
Vulnerability from nvd – Published: 2005-02-13 05:00 – Updated: 2024-08-08 00:53
VLAI?
Summary
Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T00:53:24.130Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "VU#749870",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/749870"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.juniper.net/support/security/alerts/screenos-sshv1-2.txt"
},
{
"name": "10854",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/10854"
},
{
"name": "netscreen-screenos-sshv1-dos(16876)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16876"
},
{
"name": "12208",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/12208/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-08-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "VU#749870",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/749870"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.juniper.net/support/security/alerts/screenos-sshv1-2.txt"
},
{
"name": "10854",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/10854"
},
{
"name": "netscreen-screenos-sshv1-dos(16876)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16876"
},
{
"name": "12208",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/12208/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-1446",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#749870",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/749870"
},
{
"name": "http://www.juniper.net/support/security/alerts/screenos-sshv1-2.txt",
"refsource": "CONFIRM",
"url": "http://www.juniper.net/support/security/alerts/screenos-sshv1-2.txt"
},
{
"name": "10854",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10854"
},
{
"name": "netscreen-screenos-sshv1-dos(16876)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16876"
},
{
"name": "12208",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/12208/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-1446",
"datePublished": "2005-02-13T05:00:00",
"dateReserved": "2005-02-13T00:00:00",
"dateUpdated": "2024-08-08T00:53:24.130Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-1547 (GCVE-0-2002-1547)
Vulnerability from nvd – Published: 2004-09-01 04:00 – Updated: 2024-08-08 03:26
VLAI?
Summary
Netscreen running ScreenOS 4.0.0r6 and earlier allows remote attackers to cause a denial of service via a malformed SSH packet to the Secure Command Shell (SCS) management interface, as demonstrated via certain CRC32 exploits, a different vulnerability than CVE-2001-0144.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:26:28.860Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "netscreen-ssh-dos(10528)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/10528.php"
},
{
"name": "20021101 Netscreen SSH1 CRC32 Compensation Denial of service",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0443.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.netscreen.com/support/alerts/11_06_02.html"
},
{
"name": "4376",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/4376"
},
{
"name": "20021101 Netscreen SSH1 CRC32 Compensation Denial of service",
"tags": [
"mailing-list",
"x_refsource_VULNWATCH",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0053.html"
},
{
"name": "VU#930161",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/930161"
},
{
"name": "20021101 (Correction) Netscreen SSH1 CRC32 Compensation Denial of service",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0446.html"
},
{
"name": "20021101 (Correction) Netscreen SSH1 CRC32 Compensation Denial of service",
"tags": [
"mailing-list",
"x_refsource_VULNWATCH",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0054.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-11-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Netscreen running ScreenOS 4.0.0r6 and earlier allows remote attackers to cause a denial of service via a malformed SSH packet to the Secure Command Shell (SCS) management interface, as demonstrated via certain CRC32 exploits, a different vulnerability than CVE-2001-0144."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2004-08-18T00:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "netscreen-ssh-dos(10528)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/10528.php"
},
{
"name": "20021101 Netscreen SSH1 CRC32 Compensation Denial of service",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0443.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.netscreen.com/support/alerts/11_06_02.html"
},
{
"name": "4376",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/4376"
},
{
"name": "20021101 Netscreen SSH1 CRC32 Compensation Denial of service",
"tags": [
"mailing-list",
"x_refsource_VULNWATCH"
],
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0053.html"
},
{
"name": "VU#930161",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/930161"
},
{
"name": "20021101 (Correction) Netscreen SSH1 CRC32 Compensation Denial of service",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0446.html"
},
{
"name": "20021101 (Correction) Netscreen SSH1 CRC32 Compensation Denial of service",
"tags": [
"mailing-list",
"x_refsource_VULNWATCH"
],
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0054.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-1547",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Netscreen running ScreenOS 4.0.0r6 and earlier allows remote attackers to cause a denial of service via a malformed SSH packet to the Secure Command Shell (SCS) management interface, as demonstrated via certain CRC32 exploits, a different vulnerability than CVE-2001-0144."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "netscreen-ssh-dos(10528)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/10528.php"
},
{
"name": "20021101 Netscreen SSH1 CRC32 Compensation Denial of service",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0443.html"
},
{
"name": "http://www.netscreen.com/support/alerts/11_06_02.html",
"refsource": "CONFIRM",
"url": "http://www.netscreen.com/support/alerts/11_06_02.html"
},
{
"name": "4376",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/4376"
},
{
"name": "20021101 Netscreen SSH1 CRC32 Compensation Denial of service",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0053.html"
},
{
"name": "VU#930161",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/930161"
},
{
"name": "20021101 (Correction) Netscreen SSH1 CRC32 Compensation Denial of service",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-10/0446.html"
},
{
"name": "20021101 (Correction) Netscreen SSH1 CRC32 Compensation Denial of service",
"refsource": "VULNWATCH",
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0054.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-1547",
"datePublished": "2004-09-01T04:00:00",
"dateReserved": "2003-03-04T00:00:00",
"dateUpdated": "2024-08-08T03:26:28.860Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-0891 (GCVE-0-2002-0891)
Vulnerability from nvd – Published: 2003-04-02 05:00 – Updated: 2024-08-08 03:03
VLAI?
Summary
The web interface (WebUI) of NetScreen ScreenOS before 2.6.1r8, and certain 2.8.x and 3.0.x versions before 3.0.3r1, allows remote attackers to cause a denial of service (crash) via a long user name.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:03:49.519Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "netscreen-screenos-username-dos(9186)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/9186.php"
},
{
"name": "4842",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/4842"
},
{
"name": "20020527 Netscreen 25 unauthorised reboot issue",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://online.securityfocus.com/archive/1/274240"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.netscreen.com/support/ns25_reboot.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-05-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The web interface (WebUI) of NetScreen ScreenOS before 2.6.1r8, and certain 2.8.x and 3.0.x versions before 3.0.3r1, allows remote attackers to cause a denial of service (crash) via a long user name."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-09-10T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "netscreen-screenos-username-dos(9186)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/9186.php"
},
{
"name": "4842",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/4842"
},
{
"name": "20020527 Netscreen 25 unauthorised reboot issue",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://online.securityfocus.com/archive/1/274240"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.netscreen.com/support/ns25_reboot.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0891",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The web interface (WebUI) of NetScreen ScreenOS before 2.6.1r8, and certain 2.8.x and 3.0.x versions before 3.0.3r1, allows remote attackers to cause a denial of service (crash) via a long user name."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "netscreen-screenos-username-dos(9186)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9186.php"
},
{
"name": "4842",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4842"
},
{
"name": "20020527 Netscreen 25 unauthorised reboot issue",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/274240"
},
{
"name": "http://www.netscreen.com/support/ns25_reboot.html",
"refsource": "CONFIRM",
"url": "http://www.netscreen.com/support/ns25_reboot.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0891",
"datePublished": "2003-04-02T05:00:00",
"dateReserved": "2002-08-16T00:00:00",
"dateUpdated": "2024-08-08T03:03:49.519Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-0234 (GCVE-0-2002-0234)
Vulnerability from nvd – Published: 2002-05-03 04:00 – Updated: 2024-08-08 02:42
VLAI?
Summary
NetScreen ScreenOS before 2.6.1 does not support a maximum number of concurrent sessions for a system, which allows an attacker on the trusted network to cause a denial of service (resource exhaustion) via a port scan to an external network, which consumes all available connections.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:42:28.525Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20020201 RE: NetScreen ScreenOS 2.6 Subject to Trust Interface DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101258887105690\u0026w=2"
},
{
"name": "20020201 NetScreen ScreenOS 2.6 Subject to Trust Interface DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101258281818524\u0026w=2"
},
{
"name": "20020205 NetScreen Response to ScreenOS Port Scan DoS Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://online.securityfocus.com/archive/1/254268"
},
{
"name": "netscreen-screenos-scan-dos(8057)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/8057.php"
},
{
"name": "4015",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/4015"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-02-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "NetScreen ScreenOS before 2.6.1 does not support a maximum number of concurrent sessions for a system, which allows an attacker on the trusted network to cause a denial of service (resource exhaustion) via a port scan to an external network, which consumes all available connections."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-10-17T13:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20020201 RE: NetScreen ScreenOS 2.6 Subject to Trust Interface DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101258887105690\u0026w=2"
},
{
"name": "20020201 NetScreen ScreenOS 2.6 Subject to Trust Interface DoS",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101258281818524\u0026w=2"
},
{
"name": "20020205 NetScreen Response to ScreenOS Port Scan DoS Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://online.securityfocus.com/archive/1/254268"
},
{
"name": "netscreen-screenos-scan-dos(8057)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/8057.php"
},
{
"name": "4015",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/4015"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0234",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NetScreen ScreenOS before 2.6.1 does not support a maximum number of concurrent sessions for a system, which allows an attacker on the trusted network to cause a denial of service (resource exhaustion) via a port scan to an external network, which consumes all available connections."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20020201 RE: NetScreen ScreenOS 2.6 Subject to Trust Interface DoS",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=101258887105690\u0026w=2"
},
{
"name": "20020201 NetScreen ScreenOS 2.6 Subject to Trust Interface DoS",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=101258281818524\u0026w=2"
},
{
"name": "20020205 NetScreen Response to ScreenOS Port Scan DoS Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://online.securityfocus.com/archive/1/254268"
},
{
"name": "netscreen-screenos-scan-dos(8057)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/8057.php"
},
{
"name": "4015",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4015"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0234",
"datePublished": "2002-05-03T04:00:00",
"dateReserved": "2002-05-01T00:00:00",
"dateUpdated": "2024-08-08T02:42:28.525Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2001-0589 (GCVE-0-2001-0589)
Vulnerability from nvd – Published: 2002-03-09 05:00 – Updated: 2024-08-08 04:30
VLAI?
Summary
NetScreen ScreenOS prior to 2.5r6 on the NetScreen-10 and Netscreen-100 can allow a local attacker to bypass the DMZ 'denial' policy via specific traffic patterns.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T04:30:04.842Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "netscreen-screenos-bypass-firewall(6317)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6317"
},
{
"name": "1780",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/1780"
},
{
"name": "2523",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/2523"
},
{
"name": "20010326 Netscreen: DMZ Network Receives Some \"Denied\" Traffic",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0375.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2001-03-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "NetScreen ScreenOS prior to 2.5r6 on the NetScreen-10 and Netscreen-100 can allow a local attacker to bypass the DMZ \u0027denial\u0027 policy via specific traffic patterns."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-03-01T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "netscreen-screenos-bypass-firewall(6317)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6317"
},
{
"name": "1780",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/1780"
},
{
"name": "2523",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/2523"
},
{
"name": "20010326 Netscreen: DMZ Network Receives Some \"Denied\" Traffic",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0375.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2001-0589",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NetScreen ScreenOS prior to 2.5r6 on the NetScreen-10 and Netscreen-100 can allow a local attacker to bypass the DMZ \u0027denial\u0027 policy via specific traffic patterns."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "netscreen-screenos-bypass-firewall(6317)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6317"
},
{
"name": "1780",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/1780"
},
{
"name": "2523",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2523"
},
{
"name": "20010326 Netscreen: DMZ Network Receives Some \"Denied\" Traffic",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-03/0375.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2001-0589",
"datePublished": "2002-03-09T05:00:00",
"dateReserved": "2001-07-27T00:00:00",
"dateUpdated": "2024-08-08T04:30:04.842Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}