All the vulnerabilites related to netscreen - ns-10
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A037FAA6-6D26-4496-BC67-03475B4D1155", "vulnerable": true }, { "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D3831DD3-E783-4200-8986-FDBF7DD9BA53", "vulnerable": true }, { "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "2909C9D5-3D8F-4C41-B0E7-A0C0B432C19A", "vulnerable": true }, { "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "E09436DF-E3C1-4C03-A3BE-73C4BC84BB7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "699764B6-0F86-4AB0-86A3-4F2E69AD820C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "24BB54A7-24D0-409E-8924-D212543E4AAE", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.64:*:*:*:*:*:*:*", "matchCriteriaId": "74187E80-0EDA-4FE7-A113-FCB723AF08B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.66:*:*:*:*:*:*:*", "matchCriteriaId": "0D6691BE-2591-495A-BB72-2DA9956944A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.66_r2:*:*:*:*:*:*:*", "matchCriteriaId": "CAB79FD3-29CB-4694-9A67-C6AF2EADA89D", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.73_r1:*:*:*:*:*:*:*", "matchCriteriaId": "92455F85-9BFA-4684-9A6D-0E52AFA7161B", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.73_r2:*:*:*:*:*:*:*", "matchCriteriaId": "1173EA59-AEAE-49E6-B6DD-775B28C678D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.0.1_r8:*:*:*:*:*:*:*", "matchCriteriaId": "6711CD61-E16E-41B8-8948-592171D73B5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "CAD0131A-D07C-4B23-8CEC-E7CF659DB55E", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.1_r6:*:*:*:*:*:*:*", "matchCriteriaId": "2837DDC0-9F2C-4782-AA1E-5315AB12528F", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.1_r7:*:*:*:*:*:*:*", "matchCriteriaId": "07B065C9-93C6-43EB-ADD1-532FC6FBEA87", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "4D38841C-DF2D-41D8-BD15-EBBB9E9D83E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5r1:*:*:*:*:*:*:*", "matchCriteriaId": "DDDBDBE1-E16B-4F03-9072-8B28E9467FED", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5r2:*:*:*:*:*:*:*", "matchCriteriaId": "4E099835-7C70-44F1-9E2B-07AF5B3C0577", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5r6:*:*:*:*:*:*:*", "matchCriteriaId": "D10CDE09-1896-4E99-B2A0-93F89164225A", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F3159CA4-0944-4419-9B60-E93269710377", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "2F43896A-2EF6-4069-8B81-815E4C232C0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r1:*:*:*:*:*:*:*", "matchCriteriaId": "6A7DFAB9-4D4D-4179-9DC4-F654D6E2DAB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r2:*:*:*:*:*:*:*", "matchCriteriaId": "26EC0CE2-5A5C-44ED-A423-CC20B7FFE22F", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r3:*:*:*:*:*:*:*", "matchCriteriaId": "E2BD48EE-C23B-412C-895D-F58CD81FC673", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r4:*:*:*:*:*:*:*", "matchCriteriaId": "D7A6CA51-F121-44F7-80D1-CF38261D299C", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r5:*:*:*:*:*:*:*", "matchCriteriaId": "B5064E9A-677E-418E-91A7-2DB686B662DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r6:*:*:*:*:*:*:*", "matchCriteriaId": "DB00325B-29C6-41DA-9274-C9B4C54BC53E", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r7:*:*:*:*:*:*:*", "matchCriteriaId": "8DF67517-638C-4D57-8402-F336A74C4BB8", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r8:*:*:*:*:*:*:*", "matchCriteriaId": "07AC301B-0487-4FDB-B1F8-B225099B96FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r9:*:*:*:*:*:*:*", "matchCriteriaId": "A7CE0BC3-6B59-4EAB-A2BD-CF73B3BD415F", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r10:*:*:*:*:*:*:*", "matchCriteriaId": "B9B65997-2AB7-42D1-A1D9-E999A33366CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r11:*:*:*:*:*:*:*", "matchCriteriaId": "BB3F1262-141B-48E0-8EAC-97B043EBD9FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r12:*:*:*:*:*:*:*", "matchCriteriaId": "214DA9E7-E8E5-4579-86E8-A5A8BC887860", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "1CE7F646-B716-47D7-84E8-CA875A85C983", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r1:*:*:*:*:*:*:*", "matchCriteriaId": "AA96638D-AD5F-4EFD-983B-181DCCF3EAE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r2:*:*:*:*:*:*:*", "matchCriteriaId": "2E30F9B6-24EB-44FB-9E73-5DD480A48CB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r3:*:*:*:*:*:*:*", "matchCriteriaId": "B1648D07-823B-4BF9-87EC-DB34797B5B5C", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "2D06FC50-39AE-4988-8C96-38A991CD7F97", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.8_r1:*:*:*:*:*:*:*", "matchCriteriaId": "B33B8346-B753-443F-BB24-74FF6C55340B", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r3:*:*:*:*:*:*:*", "matchCriteriaId": "47DE8E73-0F1B-42E4-9BD6-7F5066D7330B", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r4:*:*:*:*:*:*:*", "matchCriteriaId": "057B0387-44C0-45BE-9D91-D5A01C9D8020", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "28EB52A7-E8EC-46AA-A3F5-81BFA01666D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r1:*:*:*:*:*:*:*", "matchCriteriaId": "A25881AB-69D0-46E5-A502-C65933A457B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r2:*:*:*:*:*:*:*", "matchCriteriaId": "B14314AE-812D-4654-B6CE-43917A1F0542", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r3:*:*:*:*:*:*:*", "matchCriteriaId": "20F7E636-40E0-45CC-A39E-C8BDF9CFBE6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r4:*:*:*:*:*:*:*", "matchCriteriaId": "463EC9BA-B241-45D6-AB89-53EB8156E40F", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "179C18B1-3731-4DBC-A942-D810671401BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r1:*:*:*:*:*:*:*", "matchCriteriaId": "D53868A9-67B6-40AD-B4F0-6911F1D2FC6E", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r2:*:*:*:*:*:*:*", "matchCriteriaId": "8AA52D22-A0D6-413A-9F49-0452356D2BE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r3:*:*:*:*:*:*:*", "matchCriteriaId": "02BF2DCD-4F61-4FA2-B82B-FB9DEB33054F", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r4:*:*:*:*:*:*:*", "matchCriteriaId": "1C844B2C-26BB-460D-A36E-B74F45169F46", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r5:*:*:*:*:*:*:*", "matchCriteriaId": "93F618F5-E695-41BA-BFDB-E63A9A422F74", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r6:*:*:*:*:*:*:*", "matchCriteriaId": "31811D82-B28F-49CD-8C86-A4DE7CD95F31", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r7:*:*:*:*:*:*:*", "matchCriteriaId": "56D1957D-9F30-4D66-BA14-8015E260C076", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E9FCB548-2488-4EBC-AA21-4A57F5F87E41", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "2A4C0FC0-AB52-498B-84AE-DF2C380B079D", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3_r1.1:*:*:*:*:*:*:*", "matchCriteriaId": "05578911-51E3-447B-98B6-083D3F35E8F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r1:*:*:*:*:*:*:*", "matchCriteriaId": "6D71F4A5-7380-4E0E-9B81-7CCBECA3EFF0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r2:*:*:*:*:*:*:*", "matchCriteriaId": "981D2274-9686-4F6F-83B1-F4D0DA909983", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r3:*:*:*:*:*:*:*", "matchCriteriaId": "A5CD9C77-891A-4E0D-9D5D-214466699044", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r4:*:*:*:*:*:*:*", "matchCriteriaId": "F27C7E28-915C-4ECC-A9BC-779F70905614", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r5:*:*:*:*:*:*:*", "matchCriteriaId": "47206DFC-7840-4CB8-8ED4-2212C287B4DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r6:*:*:*:*:*:*:*", "matchCriteriaId": "A46904E1-F2E5-45BA-8945-4FB3EF34D299", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r7:*:*:*:*:*:*:*", "matchCriteriaId": "45551432-C02B-426D-89DC-16573A7C8CD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r8:*:*:*:*:*:*:*", "matchCriteriaId": "CBCFE4A9-9018-4F21-8BB4-D12AD0C33690", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5BFC9DEB-00D5-4FC9-A608-1F7364FF21F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r1:*:*:*:*:*:*:*", "matchCriteriaId": "EDBA6417-9C4C-41D9-91C7-96C255EB2298", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r2:*:*:*:*:*:*:*", "matchCriteriaId": "F7C65E89-186B-4D14-8A40-58B780731DF2", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r3:*:*:*:*:*:*:*", "matchCriteriaId": "26637853-7036-434E-A9AC-AAC88D84D826", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r4:*:*:*:*:*:*:*", "matchCriteriaId": "5A890FC9-CF8B-413A-A580-2F59A42D1744", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r5:*:*:*:*:*:*:*", "matchCriteriaId": "F555CCA2-95D0-4D11-A182-5A00A03403D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r6:*:*:*:*:*:*:*", "matchCriteriaId": "A4B50AC2-39DE-4446-A9ED-0627C4A9DC21", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r7:*:*:*:*:*:*:*", "matchCriteriaId": "F01ED64F-5617-412D-807D-7FAF0E45172F", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r8:*:*:*:*:*:*:*", "matchCriteriaId": "50B215E3-FDB1-43C6-9A7E-A98F381CB311", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r9:*:*:*:*:*:*:*", "matchCriteriaId": "058331CE-8DCF-4B8D-83F5-F23D935D9931", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r10:*:*:*:*:*:*:*", "matchCriteriaId": "98D3D6B3-7BB7-40AC-8FB3-F8362DA36047", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r11:*:*:*:*:*:*:*", "matchCriteriaId": "7C2E0233-3161-4B45-9EB2-D46BE76E1520", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r12:*:*:*:*:*:*:*", "matchCriteriaId": "12B61290-20EC-4D3C-A7BF-85545F5BA5BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.1_r2:*:*:*:*:*:*:*", "matchCriteriaId": "A85A76EC-8F86-47A6-A85A-8B4216C99142", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "26958BB3-1484-42EC-AC3A-33A748B377F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:dial:*:*:*:*:*", "matchCriteriaId": "6AB0B6EE-BEDE-46AD-859E-9601297B0217", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r1:*:*:*:*:*:*:*", "matchCriteriaId": "E9E29D5B-872A-4CD5-9A44-EBFA5A7C7554", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r2:*:*:*:*:*:*:*", "matchCriteriaId": "BE3851B7-72BC-4DDF-A718-69068128CA15", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r3:*:*:*:*:*:*:*", "matchCriteriaId": "19A6D877-DF7D-4E9B-8855-2ACF97C5FC29", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r4:*:*:*:*:*:*:*", "matchCriteriaId": "54FBDD05-CAA6-4034-8C2D-94E965BE2132", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r5:*:*:*:*:*:*:*", "matchCriteriaId": "7BD1CFF3-3211-43E2-858C-37142EE54490", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r6:*:*:*:*:*:*:*", "matchCriteriaId": "9BC0306C-FDDD-4B5F-B371-17CA2231C63A", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r7:*:*:*:*:*:*:*", "matchCriteriaId": "63E607F4-E348-4385-9C2C-558BB0402585", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r8:*:*:*:*:*:*:*", "matchCriteriaId": "35CA445F-428A-4EDB-A18A-5E626D0E04BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r9:*:*:*:*:*:*:*", "matchCriteriaId": "9E8885D9-20A0-443D-9650-912F360C9B14", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r10:*:*:*:*:*:*:*", "matchCriteriaId": "4FD70CC4-334A-4734-97DE-C31A6C2014AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r11:*:*:*:*:*:*:*", "matchCriteriaId": "AC456F90-05EB-4C88-9650-ED71A35A80C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r12:*:*:*:*:*:*:*", "matchCriteriaId": "FAEA92AE-A047-4A20-A209-B9CAC646BFC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "78FF0914-F907-41F4-9F2D-6ECD601C73C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r1:*:*:*:*:*:*:*", "matchCriteriaId": "48518416-3F00-4174-A0EF-57E5A614F8A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r2:*:*:*:*:*:*:*", "matchCriteriaId": "ACCD6F2D-642E-407E-A16D-73B97F709431", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r3:*:*:*:*:*:*:*", "matchCriteriaId": "438438F8-C7C3-427A-B7AA-1E7F8DA5C014", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r4:*:*:*:*:*:*:*", "matchCriteriaId": "ED08E19A-67ED-47F9-B40F-B8CFF496AF7C", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r5:*:*:*:*:*:*:*", "matchCriteriaId": "FB9021FD-198B-4D7D-BAF3-D83EC3D64EFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r6:*:*:*:*:*:*:*", "matchCriteriaId": "01E861C0-AF82-4F7C-A515-005083D7D699", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r7:*:*:*:*:*:*:*", "matchCriteriaId": "38B7AEE2-BAA4-4FDA-A627-F5A7370D2C5E", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r8:*:*:*:*:*:*:*", "matchCriteriaId": "3BCB5149-8C43-42A2-A9B2-541802FBE5B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r9:*:*:*:*:*:*:*", "matchCriteriaId": "2C3A3552-2D77-494E-902E-9529AA2074D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r10:*:*:*:*:*:*:*", "matchCriteriaId": "BD90D085-60F7-4B3F-8C82-B9F362EFFB89", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "627A41F5-BE3C-41AD-B455-0D73BE5CA010", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7D41144E-9F64-4919-87DA-09092AA2030A", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r1:*:*:*:*:*:*:*", "matchCriteriaId": "F85BBA70-D185-4A84-8D66-2D3ACE336C6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r2:*:*:*:*:*:*:*", "matchCriteriaId": "D0F6E761-1941-4B9F-98DC-1EED40B851A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r3:*:*:*:*:*:*:*", "matchCriteriaId": "3A3720A8-B042-4366-A4F2-2262CDD0CAF9", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r4:*:*:*:*:*:*:*", "matchCriteriaId": "66AEC6EE-F483-4156-91DB-E939B45D09E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F4B1021-40CB-4A11-9650-F1BDBD6943D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "19172BCC-BFF0-4031-8AFE-B63422731B17", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0r3a:*:*:*:*:*:*:*", "matchCriteriaId": "3ACCBC8E-7C9E-4C3A-8A0F-BBF4E2F92AD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "98471F46-A271-4B0A-89A9-12D544474393", "vulnerable": true }, { "criteria": "cpe:2.3:o:netscreen:ns-10:*:*:*:*:*:*:*:*", "matchCriteriaId": "8FDFE9E5-AA71-4D17-886A-E0B493B4B833", "vulnerable": true }, { "criteria": "cpe:2.3:o:netscreen:ns-100:3.0_.pe1.0:*:*:*:*:*:*:*", "matchCriteriaId": "27E6687D-08CF-48AC-8112-555149E57B45", "vulnerable": true }, { "criteria": "cpe:2.3:o:netscreen:ns-204:5.0.0_r6.0:*:*:*:*:*:*:*", "matchCriteriaId": "04797E9E-60CB-40B3-BE23-6051C72A43D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:netscreen:ns-204:0110.0_11_4.0_r10.0:*:*:*:*:*:*:*", "matchCriteriaId": "871B28F0-C082-4AD1-A4DE-22B3DC00E6BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:netscreen:ns-204:0110.0_11_5.1.0_r3a:*:*:*:*:*:*:*", "matchCriteriaId": "1AEABCBA-45BD-45B0-9343-68178FDCB493", "vulnerable": true }, { "criteria": "cpe:2.3:o:netscreen:ns-500:4110.0_11_4.0_r10.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0F057D3-1ECB-4804-8C83-9277EFD4C322", "vulnerable": true }, { "criteria": "cpe:2.3:o:netscreen:ns-500:4110.0_11_5.1.0_r3a:*:*:*:*:*:*:*", "matchCriteriaId": "6D551820-CF22-4F80-A2A6-223D9CE63444", "vulnerable": true }, { "criteria": "cpe:2.3:o:netscreen:ns-50ns25:5.0.0_r6.0:*:*:*:*:*:*:*", "matchCriteriaId": "877DF54F-752E-4FBC-8E00-7F5FD3AE63E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:juniper:netscreen-5gt:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A482DFA5-4108-4B0F-BD8E-04FEB52D3537", "vulnerable": true }, { "criteria": "cpe:2.3:h:juniper:netscreen-idp:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "3B97B63E-CE45-4DF9-9838-D9CE96CECE72", "vulnerable": true }, { "criteria": "cpe:2.3:h:juniper:netscreen-idp:3.0r1:*:*:*:*:*:*:*", "matchCriteriaId": "EE5F6D51-15B0-449D-9418-8C4C7A1E1D7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:juniper:netscreen-idp:3.0r2:*:*:*:*:*:*:*", "matchCriteriaId": "C696E607-0927-4087-A437-9C5459EB8BE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:juniper:netscreen-idp_10:3.0.1_r1:*:*:*:*:*:*:*", "matchCriteriaId": "142A3E18-3E20-415E-A53C-01E1C8865300", "vulnerable": true }, { "criteria": "cpe:2.3:h:juniper:netscreen-idp_100:3.0.1_r1:*:*:*:*:*:*:*", "matchCriteriaId": "957172A3-6B8A-48E1-911F-28A6F055FB41", "vulnerable": true }, { "criteria": "cpe:2.3:h:juniper:netscreen-idp_1000:3.0.1_r1:*:*:*:*:*:*:*", "matchCriteriaId": "95A9B902-09D4-4A29-9BA7-FD7898B24ECC", "vulnerable": true }, { "criteria": "cpe:2.3:h:juniper:netscreen-idp_500:3.0.1_r1:*:*:*:*:*:*:*", "matchCriteriaId": "214A7AFF-B36F-4ABC-8C7D-93B1493ADEB5", "vulnerable": true }, { "criteria": "cpe:2.3:h:netscreen:netscreen-sa_5000_series:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA34EB36-E5E9-43B6-ABB8-B292BC7B0CBA", "vulnerable": true }, { "criteria": "cpe:2.3:h:netscreen:netscreen-sa_5020_series:4.2_r2.2:*:*:*:*:*:*:*", "matchCriteriaId": "56B26742-2B48-4D2A-8AA3-9E86ED482424", "vulnerable": true }, { "criteria": "cpe:2.3:h:netscreen:netscreen-sa_5050_series:4.2_r2.2:*:*:*:*:*:*:*", "matchCriteriaId": "6B9103D8-B207-4622-AA6C-8D58EB36688E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid." } ], "id": "CVE-2005-2640", "lastModified": "2024-11-21T00:00:02.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-08-23T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/16474/" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1014728" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/14595" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/16474/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1014728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/14595" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2005-2640
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/14595 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=bugtraq&m=112438068426034&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm | x_refsource_MISC | |
http://securitytracker.com/id?1014728 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/16474/ | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:45:01.317Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "14595", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14595" }, { "name": "20050818 Juniper Netscreen VPN Username Enumeration Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm" }, { "name": "1014728", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014728" }, { "name": "16474", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16474/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-08-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "14595", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14595" }, { "name": "20050818 Juniper Netscreen VPN Username Enumeration Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm" }, { "name": "1014728", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014728" }, { "name": "16474", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16474/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2640", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "14595", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14595" }, { "name": "20050818 Juniper Netscreen VPN Username Enumeration Vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2" }, { "name": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm", "refsource": "MISC", "url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm" }, { "name": "1014728", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014728" }, { "name": "16474", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16474/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2640", "datePublished": "2005-08-20T04:00:00", "dateReserved": "2005-08-20T00:00:00", "dateUpdated": "2024-08-07T22:45:01.317Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-200412-0212
Vulnerability from variot
Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet. A vulnerability in the SSHv1 service of NetScreen firewalls could allow an attacker to cause a denial-of-service condition. It is reported that the vulnerability may be triggered by a remote attacker, prior to any form of authentication. Netscreen is a firewall security solution, and its operating system is ScreenOS. The firewall will reboot or hang, stopping normal services
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200412-0212", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "4.0.0r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "4.0.1r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "4.0.0r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "4.0.1r10" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "4.0.0r8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "4.0.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "4.0.1r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "4.0.0r9" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "4.0.0r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "4.0.1r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.7.1r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.7.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.8_r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3_r1.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.0.1_r8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "1.73_r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r9" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r11" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "1.73_r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.10_r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r12" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "1.7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.5r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r11" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r9" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.0r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.5r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r11" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.1_r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.5r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "1.66" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.10_r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r9" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r12" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r12" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.1_r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r10" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r10" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.7.1r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.0r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.0.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "1.64" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r10" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "1.66_r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.0r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.0r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.1_r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.7.1r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r8" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "5.0" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.3" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.3" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.3" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.3" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.3" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.2" }, { "model": "screenos r9", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "screenos r8", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "screenos r7", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "screenos r6", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "screenos r5", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "screenos r10", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "screenos r9", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r8", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r7", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r6", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r5", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r12", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r11", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r10", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos -dial", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1.1" }, { "model": "screenos r9", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r8", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r7", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r6", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r5", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r12", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r11", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r10", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r8", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos r7", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos r6", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos r5", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos r1.1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.2" }, { "model": "screenos r7", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" }, { "model": "screenos r6", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" }, { "model": "screenos r5", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.10" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.10" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.8" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.8" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.7.1" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.7.1" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.7.1" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.7.1" }, { "model": "screenos r9", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r8", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r7", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r6", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r5", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r12", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r11", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r10", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6" }, { "model": "screenos r6", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.5" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.5" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.5" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.5" }, { "model": "screenos r7", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.1" }, { "model": "screenos r6", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.1" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.1" }, { "model": "screenos r8", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.0.1" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "1.73" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "1.73" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "1.66" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "1.66" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "1.64" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "1.7" }, { "model": "ns-10", "scope": "ne", "trust": 0.3, "vendor": "netscreen", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#749870" }, { "db": "BID", "id": "10854" }, { "db": "NVD", "id": "CVE-2004-1446" }, { "db": "CNNVD", "id": "CNNVD-200412-665" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.64:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.73_r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.5r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.73_r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.0.1_r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.5r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.5r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.1_r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.1_r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:dial:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.66:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.66_r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.1_r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.8_r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3_r1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-1446" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mark Ellzey Thomas", "sources": [ { "db": "CNNVD", "id": "CNNVD-200412-665" } ], "trust": 0.6 }, "cve": "CVE-2004-1446", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-9876", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-1446", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#749870", "trust": 0.8, "value": "4.62" }, { "author": "CNNVD", "id": "CNNVD-200412-665", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-9876", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#749870" }, { "db": "VULHUB", "id": "VHN-9876" }, { "db": "NVD", "id": "CVE-2004-1446" }, { "db": "CNNVD", "id": "CNNVD-200412-665" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet. A vulnerability in the SSHv1 service of NetScreen firewalls could allow an attacker to cause a denial-of-service condition. It is reported that the vulnerability may be triggered by a remote attacker, prior to any form of authentication. Netscreen is a firewall security solution, and its operating system is ScreenOS. The firewall will reboot or hang, stopping normal services", "sources": [ { "db": "NVD", "id": "CVE-2004-1446" }, { "db": "CERT/CC", "id": "VU#749870" }, { "db": "BID", "id": "10854" }, { "db": "VULHUB", "id": "VHN-9876" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "SECUNIA", "id": "12208", "trust": 2.5 }, { "db": "CERT/CC", "id": "VU#749870", "trust": 2.5 }, { "db": "BID", "id": "10854", "trust": 2.0 }, { "db": "NVD", "id": "CVE-2004-1446", "trust": 1.7 }, { "db": "SECTRACK", "id": "1010848", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200412-665", "trust": 0.7 }, { "db": "XF", "id": "1", "trust": 0.6 }, { "db": "XF", "id": "16876", "trust": 0.6 }, { "db": "NSFOCUS", "id": "6773", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-9876", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#749870" }, { "db": "VULHUB", "id": "VHN-9876" }, { "db": "BID", "id": "10854" }, { "db": "NVD", "id": "CVE-2004-1446" }, { "db": "CNNVD", "id": "CNNVD-200412-665" } ] }, "id": "VAR-200412-0212", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-9876" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T10:44:55.634000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-1446" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.juniper.net/support/security/alerts/screenos-sshv1-2.txt" }, { "trust": 2.5, "url": "http://secunia.com/advisories/12208/" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/10854" }, { "trust": 1.7, "url": "http://www.kb.cert.org/vuls/id/749870" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16876" }, { "trust": 0.8, "url": "http://www.securitytracker.com/alerts/2004/aug/1010848.html" }, { "trust": 0.8, "url": "http://www.juniper.net/netscreen_com.html" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/16876" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/6773" }, { "trust": 0.3, "url": "http://www.juniper.net/support/security/alerts/screenos-sshv1-3.txt" } ], "sources": [ { "db": "CERT/CC", "id": "VU#749870" }, { "db": "VULHUB", "id": "VHN-9876" }, { "db": "BID", "id": "10854" }, { "db": "NVD", "id": "CVE-2004-1446" }, { "db": "CNNVD", "id": "CNNVD-200412-665" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#749870" }, { "db": "VULHUB", "id": "VHN-9876" }, { "db": "BID", "id": "10854" }, { "db": "NVD", "id": "CVE-2004-1446" }, { "db": "CNNVD", "id": "CNNVD-200412-665" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-08-13T00:00:00", "db": "CERT/CC", "id": "VU#749870" }, { "date": "2004-12-31T00:00:00", "db": "VULHUB", "id": "VHN-9876" }, { "date": "2004-08-04T00:00:00", "db": "BID", "id": "10854" }, { "date": "2004-12-31T05:00:00", "db": "NVD", "id": "CVE-2004-1446" }, { "date": "2004-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-200412-665" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-08-13T00:00:00", "db": "CERT/CC", "id": "VU#749870" }, { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-9876" }, { "date": "2004-08-04T00:00:00", "db": "BID", "id": "10854" }, { "date": "2017-07-11T01:31:02.467000", "db": "NVD", "id": "CVE-2004-1446" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200412-665" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200412-665" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juniper Networks NetScreen firewall contains a DoS vulnerability in the SSHv1 service", "sources": [ { "db": "CERT/CC", "id": "VU#749870" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200412-665" } ], "trust": 0.6 } }
var-200508-0142
Vulnerability from variot
Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid. NetScreen ScreenOS of IKE In the protocol implementation, IKE User name included in aggressive mode messages (IKE ID) Is valid VPN There are vulnerabilities that respond differently depending on whether you are a user.An effective VPN You may get your username and password hash. This allows for attackers to obtain a list of valid VPN users. With a valid username, an attacker can obtain hashed credentials against which a brute force attack may be performed. A successful crack would mean that the attacker has complete access to the network. Netscreen is one of Juniper's leading line of networking and security products. Juniper Netscreen's integrated firewall/VPN product has a VPN user name enumeration vulnerability when performing VPN security tests for customers. Once a username is discovered, an attacker can use that username to get a hash from Netscreen and then crack the associated password offline.
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/
TITLE: Juniper Netscreen IPSec VPN Username Enumeration Weakness
SECUNIA ADVISORY ID: SA16474
VERIFY ADVISORY: http://secunia.com/advisories/16474/
CRITICAL: Not critical
IMPACT: Exposure of system information
WHERE:
From remote
OPERATING SYSTEM: NetScreen ScreenOS 5.x http://secunia.com/product/2569/ NetScreen ScreenOS 4.x http://secunia.com/product/695/ NetScreen ScreenOS 3.x http://secunia.com/product/798/ NetScreen ScreenOS 2.x http://secunia.com/product/1395/
DESCRIPTION: NTA Monitor has reported a weakness in Juniper Netscreen VPN, which can be exploited by malicious people to gain knowledge of certain information.
The weakness is caused due to the device returning different responses depending on whether or not a valid username is supplied. This can be exploited to enumerate valid usernames, which can be used to obtain password hashes.
The weakness has been reported in ScreenOS software versions up to 5.2.0.
SOLUTION: Use certificate authentication instead of pre-shared key authentication.
PROVIDED AND/OR DISCOVERED BY: NTA Monitor
ORIGINAL ADVISORY: NTA Monitor: http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200508-0142", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "3.1.0r4" }, { "model": "netscreen-5gt", "scope": "eq", "trust": 1.3, "vendor": "juniper", "version": "5.0" }, { "model": "screenos", "scope": "eq", "trust": 1.1, "vendor": "juniper", "version": "5.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.7.1r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.7.1" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 1.0, "vendor": "neoteris", "version": "3.2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.8_r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3_r1.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.0.1_r8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "1.73_r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3r1" }, { "model": "netscreen-sa 5020 series", "scope": "eq", "trust": 1.0, "vendor": "netscreen", "version": "4.2_r2.2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r9" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3r2" }, { "model": "netscreen-idp 100", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1_r1" }, { "model": "ns-500", "scope": "eq", "trust": 1.0, "vendor": "netscreen", "version": "4110.0_11_4.0_r10.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0" }, { "model": "netscreen-sa 5050 series", "scope": "eq", "trust": 1.0, "vendor": "netscreen", "version": "4.2_r2.2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r11" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "1.73_r1" }, { "model": "ns-50ns25", "scope": "eq", "trust": 1.0, "vendor": "netscreen", "version": "5.0.0_r6.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.2.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r2" }, { "model": "netscreen-idp", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.10_r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r12" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r10" }, { "model": "ns-204", "scope": "eq", "trust": 1.0, "vendor": "netscreen", "version": "5.0.0_r6.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r5" }, { "model": "netscreen-idp 500", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1_r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 1.0, "vendor": "neoteris", "version": "3.3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "1.7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.5r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r11" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r9" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.0r2" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 1.0, "vendor": "neoteris", "version": "3.3.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.5r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r3" }, { "model": "ns-100", "scope": "eq", "trust": 1.0, "vendor": "netscreen", "version": "3.0_.pe1.0" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 1.0, "vendor": "neoteris", "version": "3.1" }, { "model": "netscreen-idp 10", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1_r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r11" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.1_r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.5r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "1.66" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.10_r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r9" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.1.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r12" }, { "model": "ns-500", "scope": "eq", "trust": 1.0, "vendor": "netscreen", "version": "4110.0_11_5.1.0_r3a" }, { "model": "netscreen-idp", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r9" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r12" }, { "model": "netscreen-idp 1000", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1_r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r6" }, { "model": "netscreen-sa 5000 series", "scope": "eq", "trust": 1.0, "vendor": "netscreen", "version": "*" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.1_r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r2" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 1.0, "vendor": "neoteris", "version": "3.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r10" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r4" }, { "model": "ns-10", "scope": "eq", "trust": 1.0, "vendor": "netscreen", "version": "*" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r1" }, { "model": "ns-204", "scope": "eq", "trust": 1.0, "vendor": "netscreen", "version": "0110.0_11_4.0_r10.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r10" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.7.1r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.0r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.0.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.1.0r3a" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "1.64" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r10" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "1.66_r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r2" }, { "model": "netscreen-idp", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.0r4" }, { "model": "ns-204", "scope": "eq", "trust": 1.0, "vendor": "netscreen", "version": "0110.0_11_5.1.0_r3a" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.0r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.1_r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.7.1r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r8" }, { "model": "screenos", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "2.8" }, { "model": "screenos", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "3.0" }, { "model": "screenos", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "3.1" }, { "model": "screenos", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "4.0" }, { "model": "screenos", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "5.0" }, { "model": "screenos", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "5.2" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "1.66" }, { "model": "screenos r12", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r10", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "ns-100 .pe1.0", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "netscreen-idp r1", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5003.0.1" }, { "model": "screenos r10", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "1.66" }, { "model": "ns-10", "scope": null, "trust": 0.3, "vendor": "netscreen", "version": null }, { "model": "screenos r8", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "netscreen-idp r1", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "1003.0" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos r11", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "netscreen-idp r1", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "10003.0.1" }, { "model": "netscreen-idp", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "103.0" }, { "model": "screenos r6", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.5" }, { "model": "screenos .0r3a", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "5.1" }, { "model": "screenos r5", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "screenos r8", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "netscreen-idp r1", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "103.0.1" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "screenos r5", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.8" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r9", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.2" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r10", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "netscreen-idp r2", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "1003.0" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.1" }, { "model": "ns-204 [version 0110 - ] r10.0", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r7", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "netscreen-idp", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5003.0" }, { "model": "netscreen-idp r1", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "103.0" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" }, { "model": "screenos r7", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.7.1" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "1.7" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "1.64" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.2" }, { "model": "screenos r6", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.7.1" }, { "model": "screenos r7", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.1" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.10" }, { "model": "netscreen-idp", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "10003.0" }, { "model": "screenos r6", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r8", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.7.1" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "5.0" }, { "model": "screenos r6", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "netscreen-idp r2", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "103.0" }, { "model": "screenos r7", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" }, { "model": "screenos r5", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.3" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "netscreen-idp r1", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5003.0" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.5" }, { "model": "screenos r6", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.1" }, { "model": "screenos r12", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r9", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r7", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r10", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.3" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "netscreen-idp r1", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "1003.0.1" }, { "model": "screenos r6", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" }, { "model": "netscreen-sa series", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "5000" }, { "model": "netscreen-idp r1", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "10003.0" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "1.73" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1.1" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.10" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "screenos r6", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.3.1" }, { "model": "screenos r8", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "netscreen-idp r2", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5003.0" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.8" }, { "model": "screenos r11", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r5", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "ns-500 [version 4110 - ] .0r3a", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "5.1" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5.2.0" }, { "model": "netscreen-idp r2", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "10003.0" }, { "model": "screenos r12", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r1.1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos r9", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r7", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "ns-50ns25 .0r6.0", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "5.0" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.2" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0" }, { "model": "netscreen-sa series .r.2.2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "50204.2" }, { "model": "screenos r11", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" }, { "model": "screenos r6", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.5" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos r8", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "netscreen-sa series .r.2.2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "50504.2" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "instant virtual extranet", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.3" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" }, { "model": "screenos r8", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.0.1" }, { "model": "ns-204 [version 0110 - ] .0r3a", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "5.1" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.5" }, { "model": "netscreen-idp", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "1003.0" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.3" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.7.1" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "1.73" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.3" }, { "model": "screenos r5", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "ns-204 .0r6.0", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "5.0" }, { "model": "screenos -dial", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r7", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "ns-500 [version 4110 - ] r10.0", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.3" }, { "model": "screenos r5", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0" }, { "model": "screenos r9", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "4.0.1" } ], "sources": [ { "db": "BID", "id": "14595" }, { "db": "JVNDB", "id": "JVNDB-2005-000498" }, { "db": "NVD", "id": "CVE-2005-2640" }, { "db": "CNNVD", "id": "CNNVD-200508-259" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.64:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.66:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.1_r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.1_r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3_r1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:dial:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netscreen:ns-10:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netscreen:ns-100:3.0_.pe1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.73_r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.73_r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.5r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.5r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.66_r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.8_r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netscreen:ns-204:0110.0_11_4.0_r10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netscreen:ns-204:0110.0_11_5.1.0_r3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netscreen:ns-204:5.0.0_r6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netscreen:ns-500:4110.0_11_4.0_r10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.0.1_r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.5r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.1_r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0r3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netscreen:ns-500:4110.0_11_5.1.0_r3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netscreen:ns-50ns25:5.0.0_r6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:juniper:netscreen-5gt:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:netscreen-idp_500:3.0.1_r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:netscreen:netscreen-sa_5000_series:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:netscreen-idp:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:netscreen-idp:3.0r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:netscreen:netscreen-sa_5020_series:4.2_r2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:netscreen:netscreen-sa_5050_series:4.2_r2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:netscreen-idp:3.0r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:netscreen-idp_10:3.0.1_r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:netscreen-idp_100:3.0.1_r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:netscreen-idp_1000:3.0.1_r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2005-2640" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Roy Hills Roy.Hills@nta-monitor.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200508-259" } ], "trust": 0.6 }, "cve": "CVE-2005-2640", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2005-2640", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-13849", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2005-2640", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200508-259", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-13849", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-13849" }, { "db": "JVNDB", "id": "JVNDB-2005-000498" }, { "db": "NVD", "id": "CVE-2005-2640" }, { "db": "CNNVD", "id": "CNNVD-200508-259" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid. NetScreen ScreenOS of IKE In the protocol implementation, IKE User name included in aggressive mode messages (IKE ID) Is valid VPN There are vulnerabilities that respond differently depending on whether you are a user.An effective VPN You may get your username and password hash. This allows for attackers to obtain a list of valid VPN users. With a valid username, an attacker can obtain hashed credentials against which a brute force attack may be performed. A successful crack would mean that the attacker has complete access to the network. Netscreen is one of Juniper\u0027s leading line of networking and security products. Juniper Netscreen\u0027s integrated firewall/VPN product has a VPN user name enumeration vulnerability when performing VPN security tests for customers. Once a username is discovered, an attacker can use that username to get a hash from Netscreen and then crack the associated password offline. \n\n----------------------------------------------------------------------\n\nBist Du interessiert an einem neuen Job in IT-Sicherheit?\n\n\nSecunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-\nSicherheit:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nJuniper Netscreen IPSec VPN Username Enumeration Weakness\n\nSECUNIA ADVISORY ID:\nSA16474\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/16474/\n\nCRITICAL:\nNot critical\n\nIMPACT:\nExposure of system information\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nNetScreen ScreenOS 5.x\nhttp://secunia.com/product/2569/\nNetScreen ScreenOS 4.x\nhttp://secunia.com/product/695/\nNetScreen ScreenOS 3.x\nhttp://secunia.com/product/798/\nNetScreen ScreenOS 2.x\nhttp://secunia.com/product/1395/\n\nDESCRIPTION:\nNTA Monitor has reported a weakness in Juniper Netscreen VPN, which\ncan be exploited by malicious people to gain knowledge of certain\ninformation. \n\nThe weakness is caused due to the device returning different\nresponses depending on whether or not a valid username is supplied. \nThis can be exploited to enumerate valid usernames, which can be used\nto obtain password hashes. \n\nThe weakness has been reported in ScreenOS software versions up to\n5.2.0. \n\nSOLUTION:\nUse certificate authentication instead of pre-shared key\nauthentication. \n\nPROVIDED AND/OR DISCOVERED BY:\nNTA Monitor\n\nORIGINAL ADVISORY:\nNTA Monitor:\nhttp://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2005-2640" }, { "db": "JVNDB", "id": "JVNDB-2005-000498" }, { "db": "BID", "id": "14595" }, { "db": "VULHUB", "id": "VHN-13849" }, { "db": "PACKETSTORM", "id": "39477" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-13849", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-13849" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "14595", "trust": 2.8 }, { "db": "SECUNIA", "id": "16474", "trust": 2.6 }, { "db": "NVD", "id": "CVE-2005-2640", "trust": 2.5 }, { "db": "SECTRACK", "id": "1014728", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2005-000498", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200508-259", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20050818 JUNIPER NETSCREEN VPN USERNAME ENUMERATION VULNERABILITY", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-79814", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "26168", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-13849", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "39477", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-13849" }, { "db": "BID", "id": "14595" }, { "db": "JVNDB", "id": "JVNDB-2005-000498" }, { "db": "PACKETSTORM", "id": "39477" }, { "db": "NVD", "id": "CVE-2005-2640" }, { "db": "CNNVD", "id": "CNNVD-200508-259" } ] }, "id": "VAR-200508-0142", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-13849" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:30:56.840000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "5212", "trust": 0.8, "url": "https://www.juniper.net/support/security/alerts/adv5212.txt" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000498" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-2640" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://secunia.com/advisories/16474/" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/14595" }, { "trust": 1.8, "url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1014728" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-2640" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-2640" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=112438068426034\u0026w=2" }, { "trust": 0.3, "url": "http://www.juniper.net/" }, { "trust": 0.3, "url": "http://www.netscreen.com/index.html" }, { "trust": 0.3, "url": "/archive/1/408478" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=112438068426034\u0026amp;w=2" }, { "trust": 0.1, "url": "http://secunia.com/product/1395/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/695/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_vacancies/" }, { "trust": 0.1, "url": "http://secunia.com/product/798/" }, { "trust": 0.1, "url": "http://secunia.com/product/2569/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" } ], "sources": [ { "db": "VULHUB", "id": "VHN-13849" }, { "db": "BID", "id": "14595" }, { "db": "JVNDB", "id": "JVNDB-2005-000498" }, { "db": "PACKETSTORM", "id": "39477" }, { "db": "NVD", "id": "CVE-2005-2640" }, { "db": "CNNVD", "id": "CNNVD-200508-259" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-13849" }, { "db": "BID", "id": "14595" }, { "db": "JVNDB", "id": "JVNDB-2005-000498" }, { "db": "PACKETSTORM", "id": "39477" }, { "db": "NVD", "id": "CVE-2005-2640" }, { "db": "CNNVD", "id": "CNNVD-200508-259" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-08-23T00:00:00", "db": "VULHUB", "id": "VHN-13849" }, { "date": "2005-08-18T00:00:00", "db": "BID", "id": "14595" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000498" }, { "date": "2005-08-19T04:15:49", "db": "PACKETSTORM", "id": "39477" }, { "date": "2005-08-23T04:00:00", "db": "NVD", "id": "CVE-2005-2640" }, { "date": "2005-08-23T00:00:00", "db": "CNNVD", "id": "CNNVD-200508-259" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-10-18T00:00:00", "db": "VULHUB", "id": "VHN-13849" }, { "date": "2005-08-18T00:00:00", "db": "BID", "id": "14595" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000498" }, { "date": "2016-10-18T03:29:16.917000", "db": "NVD", "id": "CVE-2005-2640" }, { "date": "2007-02-19T00:00:00", "db": "CNNVD", "id": "CNNVD-200508-259" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200508-259" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juniper Netscreen VPN Username Enumeration Vulnerability", "sources": [ { "db": "BID", "id": "14595" }, { "db": "CNNVD", "id": "CNNVD-200508-259" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "14595" }, { "db": "CNNVD", "id": "CNNVD-200508-259" } ], "trust": 0.9 } }