All the vulnerabilites related to netscreen - ns-10
Vulnerability from fkie_nvd
Published
2005-08-23 04:00
Modified
2024-11-21 00:00
Severity ?
Summary
Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid.
Impacted products
Vendor Product Version
neoteris instant_virtual_extranet 3.0
neoteris instant_virtual_extranet 3.1
neoteris instant_virtual_extranet 3.2
neoteris instant_virtual_extranet 3.3
neoteris instant_virtual_extranet 3.3.1
juniper netscreen_screenos 1.7
juniper netscreen_screenos 1.64
juniper netscreen_screenos 1.66
juniper netscreen_screenos 1.66_r2
juniper netscreen_screenos 1.73_r1
juniper netscreen_screenos 1.73_r2
juniper netscreen_screenos 2.0.1_r8
juniper netscreen_screenos 2.1
juniper netscreen_screenos 2.1_r6
juniper netscreen_screenos 2.1_r7
juniper netscreen_screenos 2.5
juniper netscreen_screenos 2.5r1
juniper netscreen_screenos 2.5r2
juniper netscreen_screenos 2.5r6
juniper netscreen_screenos 2.6.0
juniper netscreen_screenos 2.6.1
juniper netscreen_screenos 2.6.1r1
juniper netscreen_screenos 2.6.1r2
juniper netscreen_screenos 2.6.1r3
juniper netscreen_screenos 2.6.1r4
juniper netscreen_screenos 2.6.1r5
juniper netscreen_screenos 2.6.1r6
juniper netscreen_screenos 2.6.1r7
juniper netscreen_screenos 2.6.1r8
juniper netscreen_screenos 2.6.1r9
juniper netscreen_screenos 2.6.1r10
juniper netscreen_screenos 2.6.1r11
juniper netscreen_screenos 2.6.1r12
juniper netscreen_screenos 2.7.1
juniper netscreen_screenos 2.7.1r1
juniper netscreen_screenos 2.7.1r2
juniper netscreen_screenos 2.7.1r3
juniper netscreen_screenos 2.8
juniper netscreen_screenos 2.8_r1
juniper netscreen_screenos 2.10_r3
juniper netscreen_screenos 2.10_r4
juniper netscreen_screenos 3.0.0
juniper netscreen_screenos 3.0.0r1
juniper netscreen_screenos 3.0.0r2
juniper netscreen_screenos 3.0.0r3
juniper netscreen_screenos 3.0.0r4
juniper netscreen_screenos 3.0.1
juniper netscreen_screenos 3.0.1r1
juniper netscreen_screenos 3.0.1r2
juniper netscreen_screenos 3.0.1r3
juniper netscreen_screenos 3.0.1r4
juniper netscreen_screenos 3.0.1r5
juniper netscreen_screenos 3.0.1r6
juniper netscreen_screenos 3.0.1r7
juniper netscreen_screenos 3.0.2
juniper netscreen_screenos 3.0.3
juniper netscreen_screenos 3.0.3_r1.1
juniper netscreen_screenos 3.0.3r1
juniper netscreen_screenos 3.0.3r2
juniper netscreen_screenos 3.0.3r3
juniper netscreen_screenos 3.0.3r4
juniper netscreen_screenos 3.0.3r5
juniper netscreen_screenos 3.0.3r6
juniper netscreen_screenos 3.0.3r7
juniper netscreen_screenos 3.0.3r8
juniper netscreen_screenos 3.1.0
juniper netscreen_screenos 3.1.0r1
juniper netscreen_screenos 3.1.0r2
juniper netscreen_screenos 3.1.0r3
juniper netscreen_screenos 3.1.0r4
juniper netscreen_screenos 3.1.0r5
juniper netscreen_screenos 3.1.0r6
juniper netscreen_screenos 3.1.0r7
juniper netscreen_screenos 3.1.0r8
juniper netscreen_screenos 3.1.0r9
juniper netscreen_screenos 3.1.0r10
juniper netscreen_screenos 3.1.0r11
juniper netscreen_screenos 3.1.0r12
juniper netscreen_screenos 3.1.1_r2
juniper netscreen_screenos 4.0.0
juniper netscreen_screenos 4.0.0
juniper netscreen_screenos 4.0.0r1
juniper netscreen_screenos 4.0.0r2
juniper netscreen_screenos 4.0.0r3
juniper netscreen_screenos 4.0.0r4
juniper netscreen_screenos 4.0.0r5
juniper netscreen_screenos 4.0.0r6
juniper netscreen_screenos 4.0.0r7
juniper netscreen_screenos 4.0.0r8
juniper netscreen_screenos 4.0.0r9
juniper netscreen_screenos 4.0.0r10
juniper netscreen_screenos 4.0.0r11
juniper netscreen_screenos 4.0.0r12
juniper netscreen_screenos 4.0.1
juniper netscreen_screenos 4.0.1r1
juniper netscreen_screenos 4.0.1r2
juniper netscreen_screenos 4.0.1r3
juniper netscreen_screenos 4.0.1r4
juniper netscreen_screenos 4.0.1r5
juniper netscreen_screenos 4.0.1r6
juniper netscreen_screenos 4.0.1r7
juniper netscreen_screenos 4.0.1r8
juniper netscreen_screenos 4.0.1r9
juniper netscreen_screenos 4.0.1r10
juniper netscreen_screenos 4.0.2
juniper netscreen_screenos 4.0.3
juniper netscreen_screenos 4.0.3r1
juniper netscreen_screenos 4.0.3r2
juniper netscreen_screenos 4.0.3r3
juniper netscreen_screenos 4.0.3r4
juniper netscreen_screenos 5.0.0
juniper netscreen_screenos 5.1.0
juniper netscreen_screenos 5.1.0r3a
juniper netscreen_screenos 5.2.0
netscreen ns-10 *
netscreen ns-100 3.0_.pe1.0
netscreen ns-204 5.0.0_r6.0
netscreen ns-204 0110.0_11_4.0_r10.0
netscreen ns-204 0110.0_11_5.1.0_r3a
netscreen ns-500 4110.0_11_4.0_r10.0
netscreen ns-500 4110.0_11_5.1.0_r3a
netscreen ns-50ns25 5.0.0_r6.0
juniper netscreen-5gt 5.0
juniper netscreen-idp 3.0
juniper netscreen-idp 3.0r1
juniper netscreen-idp 3.0r2
juniper netscreen-idp_10 3.0.1_r1
juniper netscreen-idp_100 3.0.1_r1
juniper netscreen-idp_1000 3.0.1_r1
juniper netscreen-idp_500 3.0.1_r1
netscreen netscreen-sa_5000_series *
netscreen netscreen-sa_5020_series 4.2_r2.2
netscreen netscreen-sa_5050_series 4.2_r2.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A037FAA6-6D26-4496-BC67-03475B4D1155",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3831DD3-E783-4200-8986-FDBF7DD9BA53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2909C9D5-3D8F-4C41-B0E7-A0C0B432C19A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09436DF-E3C1-4C03-A3BE-73C4BC84BB7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "699764B6-0F86-4AB0-86A3-4F2E69AD820C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "24BB54A7-24D0-409E-8924-D212543E4AAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "74187E80-0EDA-4FE7-A113-FCB723AF08B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D6691BE-2591-495A-BB72-2DA9956944A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.66_r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAB79FD3-29CB-4694-9A67-C6AF2EADA89D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.73_r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "92455F85-9BFA-4684-9A6D-0E52AFA7161B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:1.73_r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1173EA59-AEAE-49E6-B6DD-775B28C678D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.0.1_r8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6711CD61-E16E-41B8-8948-592171D73B5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAD0131A-D07C-4B23-8CEC-E7CF659DB55E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.1_r6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2837DDC0-9F2C-4782-AA1E-5315AB12528F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.1_r7:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B065C9-93C6-43EB-ADD1-532FC6FBEA87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D38841C-DF2D-41D8-BD15-EBBB9E9D83E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDDBDBE1-E16B-4F03-9072-8B28E9467FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E099835-7C70-44F1-9E2B-07AF5B3C0577",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.5r6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D10CDE09-1896-4E99-B2A0-93F89164225A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3159CA4-0944-4419-9B60-E93269710377",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F43896A-2EF6-4069-8B81-815E4C232C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A7DFAB9-4D4D-4179-9DC4-F654D6E2DAB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "26EC0CE2-5A5C-44ED-A423-CC20B7FFE22F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2BD48EE-C23B-412C-895D-F58CD81FC673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7A6CA51-F121-44F7-80D1-CF38261D299C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5064E9A-677E-418E-91A7-2DB686B662DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB00325B-29C6-41DA-9274-C9B4C54BC53E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DF67517-638C-4D57-8402-F336A74C4BB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r8:*:*:*:*:*:*:*",
              "matchCriteriaId": "07AC301B-0487-4FDB-B1F8-B225099B96FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7CE0BC3-6B59-4EAB-A2BD-CF73B3BD415F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9B65997-2AB7-42D1-A1D9-E999A33366CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r11:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB3F1262-141B-48E0-8EAC-97B043EBD9FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r12:*:*:*:*:*:*:*",
              "matchCriteriaId": "214DA9E7-E8E5-4579-86E8-A5A8BC887860",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE7F646-B716-47D7-84E8-CA875A85C983",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA96638D-AD5F-4EFD-983B-181DCCF3EAE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E30F9B6-24EB-44FB-9E73-5DD480A48CB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1648D07-823B-4BF9-87EC-DB34797B5B5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D06FC50-39AE-4988-8C96-38A991CD7F97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.8_r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B33B8346-B753-443F-BB24-74FF6C55340B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r3:*:*:*:*:*:*:*",
              "matchCriteriaId": "47DE8E73-0F1B-42E4-9BD6-7F5066D7330B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r4:*:*:*:*:*:*:*",
              "matchCriteriaId": "057B0387-44C0-45BE-9D91-D5A01C9D8020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "28EB52A7-E8EC-46AA-A3F5-81BFA01666D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A25881AB-69D0-46E5-A502-C65933A457B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14314AE-812D-4654-B6CE-43917A1F0542",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r3:*:*:*:*:*:*:*",
              "matchCriteriaId": "20F7E636-40E0-45CC-A39E-C8BDF9CFBE6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r4:*:*:*:*:*:*:*",
              "matchCriteriaId": "463EC9BA-B241-45D6-AB89-53EB8156E40F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "179C18B1-3731-4DBC-A942-D810671401BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D53868A9-67B6-40AD-B4F0-6911F1D2FC6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AA52D22-A0D6-413A-9F49-0452356D2BE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r3:*:*:*:*:*:*:*",
              "matchCriteriaId": "02BF2DCD-4F61-4FA2-B82B-FB9DEB33054F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C844B2C-26BB-460D-A36E-B74F45169F46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r5:*:*:*:*:*:*:*",
              "matchCriteriaId": "93F618F5-E695-41BA-BFDB-E63A9A422F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r6:*:*:*:*:*:*:*",
              "matchCriteriaId": "31811D82-B28F-49CD-8C86-A4DE7CD95F31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r7:*:*:*:*:*:*:*",
              "matchCriteriaId": "56D1957D-9F30-4D66-BA14-8015E260C076",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9FCB548-2488-4EBC-AA21-4A57F5F87E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A4C0FC0-AB52-498B-84AE-DF2C380B079D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3_r1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "05578911-51E3-447B-98B6-083D3F35E8F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D71F4A5-7380-4E0E-9B81-7CCBECA3EFF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "981D2274-9686-4F6F-83B1-F4D0DA909983",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5CD9C77-891A-4E0D-9D5D-214466699044",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F27C7E28-915C-4ECC-A9BC-779F70905614",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r5:*:*:*:*:*:*:*",
              "matchCriteriaId": "47206DFC-7840-4CB8-8ED4-2212C287B4DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A46904E1-F2E5-45BA-8945-4FB3EF34D299",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r7:*:*:*:*:*:*:*",
              "matchCriteriaId": "45551432-C02B-426D-89DC-16573A7C8CD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBCFE4A9-9018-4F21-8BB4-D12AD0C33690",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BFC9DEB-00D5-4FC9-A608-1F7364FF21F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDBA6417-9C4C-41D9-91C7-96C255EB2298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7C65E89-186B-4D14-8A40-58B780731DF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r3:*:*:*:*:*:*:*",
              "matchCriteriaId": "26637853-7036-434E-A9AC-AAC88D84D826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A890FC9-CF8B-413A-A580-2F59A42D1744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F555CCA2-95D0-4D11-A182-5A00A03403D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r6:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4B50AC2-39DE-4446-A9ED-0627C4A9DC21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F01ED64F-5617-412D-807D-7FAF0E45172F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r8:*:*:*:*:*:*:*",
              "matchCriteriaId": "50B215E3-FDB1-43C6-9A7E-A98F381CB311",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r9:*:*:*:*:*:*:*",
              "matchCriteriaId": "058331CE-8DCF-4B8D-83F5-F23D935D9931",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r10:*:*:*:*:*:*:*",
              "matchCriteriaId": "98D3D6B3-7BB7-40AC-8FB3-F8362DA36047",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C2E0233-3161-4B45-9EB2-D46BE76E1520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r12:*:*:*:*:*:*:*",
              "matchCriteriaId": "12B61290-20EC-4D3C-A7BF-85545F5BA5BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:3.1.1_r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A85A76EC-8F86-47A6-A85A-8B4216C99142",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "26958BB3-1484-42EC-AC3A-33A748B377F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:dial:*:*:*:*:*",
              "matchCriteriaId": "6AB0B6EE-BEDE-46AD-859E-9601297B0217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9E29D5B-872A-4CD5-9A44-EBFA5A7C7554",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE3851B7-72BC-4DDF-A718-69068128CA15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r3:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A6D877-DF7D-4E9B-8855-2ACF97C5FC29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r4:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FBDD05-CAA6-4034-8C2D-94E965BE2132",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BD1CFF3-3211-43E2-858C-37142EE54490",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC0306C-FDDD-4B5F-B371-17CA2231C63A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r7:*:*:*:*:*:*:*",
              "matchCriteriaId": "63E607F4-E348-4385-9C2C-558BB0402585",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r8:*:*:*:*:*:*:*",
              "matchCriteriaId": "35CA445F-428A-4EDB-A18A-5E626D0E04BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r9:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E8885D9-20A0-443D-9650-912F360C9B14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FD70CC4-334A-4734-97DE-C31A6C2014AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r11:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC456F90-05EB-4C88-9650-ED71A35A80C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAEA92AE-A047-4A20-A209-B9CAC646BFC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "78FF0914-F907-41F4-9F2D-6ECD601C73C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "48518416-3F00-4174-A0EF-57E5A614F8A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACCD6F2D-642E-407E-A16D-73B97F709431",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r3:*:*:*:*:*:*:*",
              "matchCriteriaId": "438438F8-C7C3-427A-B7AA-1E7F8DA5C014",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED08E19A-67ED-47F9-B40F-B8CFF496AF7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB9021FD-198B-4D7D-BAF3-D83EC3D64EFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r6:*:*:*:*:*:*:*",
              "matchCriteriaId": "01E861C0-AF82-4F7C-A515-005083D7D699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r7:*:*:*:*:*:*:*",
              "matchCriteriaId": "38B7AEE2-BAA4-4FDA-A627-F5A7370D2C5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BCB5149-8C43-42A2-A9B2-541802FBE5B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C3A3552-2D77-494E-902E-9529AA2074D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD90D085-60F7-4B3F-8C82-B9F362EFFB89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "627A41F5-BE3C-41AD-B455-0D73BE5CA010",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D41144E-9F64-4919-87DA-09092AA2030A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F85BBA70-D185-4A84-8D66-2D3ACE336C6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0F6E761-1941-4B9F-98DC-1EED40B851A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A3720A8-B042-4366-A4F2-2262CDD0CAF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r4:*:*:*:*:*:*:*",
              "matchCriteriaId": "66AEC6EE-F483-4156-91DB-E939B45D09E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F4B1021-40CB-4A11-9650-F1BDBD6943D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "19172BCC-BFF0-4031-8AFE-B63422731B17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0r3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ACCBC8E-7C9E-4C3A-8A0F-BBF4E2F92AD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:juniper:netscreen_screenos:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "98471F46-A271-4B0A-89A9-12D544474393",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:netscreen:ns-10:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FDFE9E5-AA71-4D17-886A-E0B493B4B833",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:netscreen:ns-100:3.0_.pe1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "27E6687D-08CF-48AC-8112-555149E57B45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:netscreen:ns-204:5.0.0_r6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04797E9E-60CB-40B3-BE23-6051C72A43D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:netscreen:ns-204:0110.0_11_4.0_r10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "871B28F0-C082-4AD1-A4DE-22B3DC00E6BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:netscreen:ns-204:0110.0_11_5.1.0_r3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AEABCBA-45BD-45B0-9343-68178FDCB493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:netscreen:ns-500:4110.0_11_4.0_r10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0F057D3-1ECB-4804-8C83-9277EFD4C322",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:netscreen:ns-500:4110.0_11_5.1.0_r3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D551820-CF22-4F80-A2A6-223D9CE63444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:netscreen:ns-50ns25:5.0.0_r6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "877DF54F-752E-4FBC-8E00-7F5FD3AE63E0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:juniper:netscreen-5gt:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A482DFA5-4108-4B0F-BD8E-04FEB52D3537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:juniper:netscreen-idp:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B97B63E-CE45-4DF9-9838-D9CE96CECE72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:juniper:netscreen-idp:3.0r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE5F6D51-15B0-449D-9418-8C4C7A1E1D7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:juniper:netscreen-idp:3.0r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C696E607-0927-4087-A437-9C5459EB8BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:juniper:netscreen-idp_10:3.0.1_r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "142A3E18-3E20-415E-A53C-01E1C8865300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:juniper:netscreen-idp_100:3.0.1_r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "957172A3-6B8A-48E1-911F-28A6F055FB41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:juniper:netscreen-idp_1000:3.0.1_r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "95A9B902-09D4-4A29-9BA7-FD7898B24ECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:juniper:netscreen-idp_500:3.0.1_r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "214A7AFF-B36F-4ABC-8C7D-93B1493ADEB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:netscreen:netscreen-sa_5000_series:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA34EB36-E5E9-43B6-ABB8-B292BC7B0CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:netscreen:netscreen-sa_5020_series:4.2_r2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "56B26742-2B48-4D2A-8AA3-9E86ED482424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:netscreen:netscreen-sa_5050_series:4.2_r2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B9103D8-B207-4622-AA6C-8D58EB36688E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid."
    }
  ],
  "id": "CVE-2005-2640",
  "lastModified": "2024-11-21T00:00:02.210",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-08-23T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16474/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1014728"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/14595"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16474/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1014728"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/14595"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2005-2640
Vulnerability from cvelistv5
Published
2005-08-20 04:00
Modified
2024-08-07 22:45
Severity ?
Summary
Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid.
References
http://www.securityfocus.com/bid/14595vdb-entry, x_refsource_BID
http://marc.info/?l=bugtraq&m=112438068426034&w=2mailing-list, x_refsource_BUGTRAQ
http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htmx_refsource_MISC
http://securitytracker.com/id?1014728vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/16474/third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:45:01.317Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "14595",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14595"
          },
          {
            "name": "20050818 Juniper Netscreen VPN Username Enumeration Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm"
          },
          {
            "name": "1014728",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014728"
          },
          {
            "name": "16474",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16474/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "14595",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14595"
        },
        {
          "name": "20050818 Juniper Netscreen VPN Username Enumeration Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm"
        },
        {
          "name": "1014728",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014728"
        },
        {
          "name": "16474",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16474/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2640",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "14595",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14595"
            },
            {
              "name": "20050818 Juniper Netscreen VPN Username Enumeration Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2"
            },
            {
              "name": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm",
              "refsource": "MISC",
              "url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm"
            },
            {
              "name": "1014728",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014728"
            },
            {
              "name": "16474",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16474/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2640",
    "datePublished": "2005-08-20T04:00:00",
    "dateReserved": "2005-08-20T00:00:00",
    "dateUpdated": "2024-08-07T22:45:01.317Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

var-200412-0212
Vulnerability from variot

Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet. A vulnerability in the SSHv1 service of NetScreen firewalls could allow an attacker to cause a denial-of-service condition. It is reported that the vulnerability may be triggered by a remote attacker, prior to any form of authentication. Netscreen is a firewall security solution, and its operating system is ScreenOS. The firewall will reboot or hang, stopping normal services

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200412-0212",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "juniper",
        "version": "4.0.0r7"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "juniper",
        "version": "4.0.1r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "juniper",
        "version": "4.0.0r6"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "juniper",
        "version": "4.0.1r10"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "juniper",
        "version": "4.0.0r8"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "juniper",
        "version": "4.0.1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "juniper",
        "version": "4.0.1r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "juniper",
        "version": "4.0.0r9"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "juniper",
        "version": "4.0.0r5"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "juniper",
        "version": "4.0.1r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.8"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.7.1r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.7.1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r7"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.8_r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3_r1.1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.3r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r4"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.0.1_r8"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "1.73_r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.3r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r9"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r7"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.3r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r11"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.0"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r5"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "1.73_r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r5"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1r5"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.10_r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1r4"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3r4"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r4"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r12"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3r5"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "1.7"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.5r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r11"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r9"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r4"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.0r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.5r6"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r11"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.1_r6"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r8"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.5r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "1.66"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3r7"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.1r7"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.10_r4"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.0"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.1r9"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.3r4"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r12"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r12"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r6"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.1_r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.1r6"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r10"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.1r4"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3r6"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r8"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r10"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.1r5"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.1r8"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.7.1r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.0r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "5.0.0"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "1.64"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r6"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r10"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "1.66_r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.0r4"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.0r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1r7"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1r6"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.1_r7"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.7.1r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.5"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3r8"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "juniper",
        "version": null
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "5.0"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.3"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.3"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.3"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.3"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.3"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.2"
      },
      {
        "model": "screenos r9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "screenos r8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "screenos r7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "screenos r6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "screenos r5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "screenos r10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "screenos r9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r11",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos -dial",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1.1"
      },
      {
        "model": "screenos r9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r11",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos r7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos r6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos r5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos r1.1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.2"
      },
      {
        "model": "screenos r7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "screenos r6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "screenos r5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.10"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.10"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.8"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.8"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.7.1"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.7.1"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.7.1"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.7.1"
      },
      {
        "model": "screenos r9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r11",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6"
      },
      {
        "model": "screenos r6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.5"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.5"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.5"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.5"
      },
      {
        "model": "screenos r7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.1"
      },
      {
        "model": "screenos r6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.1"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.1"
      },
      {
        "model": "screenos r8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.0.1"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "1.73"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "1.73"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "1.66"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "1.66"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "1.64"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "1.7"
      },
      {
        "model": "ns-10",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#749870"
      },
      {
        "db": "BID",
        "id": "10854"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-1446"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-665"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.64:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.73_r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.5r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.73_r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.0.1_r8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.5r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.5r6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.1_r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.1_r6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:dial:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.66:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.66_r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.1_r7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.8_r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3_r1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-1446"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mark Ellzey Thomas",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-665"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2004-1446",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-9876",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2004-1446",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#749870",
            "trust": 0.8,
            "value": "4.62"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200412-665",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-9876",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#749870"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9876"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-1446"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-665"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet. A vulnerability in the SSHv1 service of NetScreen firewalls could allow an attacker to cause a denial-of-service condition. It is reported that the vulnerability may be triggered by a remote attacker, prior to any form of authentication. Netscreen is a firewall security solution, and its operating system is ScreenOS. The firewall will reboot or hang, stopping normal services",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-1446"
      },
      {
        "db": "CERT/CC",
        "id": "VU#749870"
      },
      {
        "db": "BID",
        "id": "10854"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9876"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "SECUNIA",
        "id": "12208",
        "trust": 2.5
      },
      {
        "db": "CERT/CC",
        "id": "VU#749870",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "10854",
        "trust": 2.0
      },
      {
        "db": "NVD",
        "id": "CVE-2004-1446",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1010848",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-665",
        "trust": 0.7
      },
      {
        "db": "XF",
        "id": "1",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "16876",
        "trust": 0.6
      },
      {
        "db": "NSFOCUS",
        "id": "6773",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-9876",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#749870"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9876"
      },
      {
        "db": "BID",
        "id": "10854"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-1446"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-665"
      }
    ]
  },
  "id": "VAR-200412-0212",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9876"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T10:44:55.634000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-1446"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.juniper.net/support/security/alerts/screenos-sshv1-2.txt"
      },
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/12208/"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/10854"
      },
      {
        "trust": 1.7,
        "url": "http://www.kb.cert.org/vuls/id/749870"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16876"
      },
      {
        "trust": 0.8,
        "url": "http://www.securitytracker.com/alerts/2004/aug/1010848.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.juniper.net/netscreen_com.html"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/16876"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/6773"
      },
      {
        "trust": 0.3,
        "url": "http://www.juniper.net/support/security/alerts/screenos-sshv1-3.txt"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#749870"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9876"
      },
      {
        "db": "BID",
        "id": "10854"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-1446"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-665"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#749870"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9876"
      },
      {
        "db": "BID",
        "id": "10854"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-1446"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-665"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-08-13T00:00:00",
        "db": "CERT/CC",
        "id": "VU#749870"
      },
      {
        "date": "2004-12-31T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9876"
      },
      {
        "date": "2004-08-04T00:00:00",
        "db": "BID",
        "id": "10854"
      },
      {
        "date": "2004-12-31T05:00:00",
        "db": "NVD",
        "id": "CVE-2004-1446"
      },
      {
        "date": "2004-08-03T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200412-665"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-08-13T00:00:00",
        "db": "CERT/CC",
        "id": "VU#749870"
      },
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9876"
      },
      {
        "date": "2004-08-04T00:00:00",
        "db": "BID",
        "id": "10854"
      },
      {
        "date": "2017-07-11T01:31:02.467000",
        "db": "NVD",
        "id": "CVE-2004-1446"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200412-665"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-665"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Juniper Networks NetScreen firewall contains a DoS vulnerability in the SSHv1 service",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#749870"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-665"
      }
    ],
    "trust": 0.6
  }
}

var-200508-0142
Vulnerability from variot

Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid. NetScreen ScreenOS of IKE In the protocol implementation, IKE User name included in aggressive mode messages (IKE ID) Is valid VPN There are vulnerabilities that respond differently depending on whether you are a user.An effective VPN You may get your username and password hash. This allows for attackers to obtain a list of valid VPN users. With a valid username, an attacker can obtain hashed credentials against which a brute force attack may be performed. A successful crack would mean that the attacker has complete access to the network. Netscreen is one of Juniper's leading line of networking and security products. Juniper Netscreen's integrated firewall/VPN product has a VPN user name enumeration vulnerability when performing VPN security tests for customers. Once a username is discovered, an attacker can use that username to get a hash from Netscreen and then crack the associated password offline.


Bist Du interessiert an einem neuen Job in IT-Sicherheit?

Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/


TITLE: Juniper Netscreen IPSec VPN Username Enumeration Weakness

SECUNIA ADVISORY ID: SA16474

VERIFY ADVISORY: http://secunia.com/advisories/16474/

CRITICAL: Not critical

IMPACT: Exposure of system information

WHERE:

From remote

OPERATING SYSTEM: NetScreen ScreenOS 5.x http://secunia.com/product/2569/ NetScreen ScreenOS 4.x http://secunia.com/product/695/ NetScreen ScreenOS 3.x http://secunia.com/product/798/ NetScreen ScreenOS 2.x http://secunia.com/product/1395/

DESCRIPTION: NTA Monitor has reported a weakness in Juniper Netscreen VPN, which can be exploited by malicious people to gain knowledge of certain information.

The weakness is caused due to the device returning different responses depending on whether or not a valid username is supplied. This can be exploited to enumerate valid usernames, which can be used to obtain password hashes.

The weakness has been reported in ScreenOS software versions up to 5.2.0.

SOLUTION: Use certificate authentication instead of pre-shared key authentication.

PROVIDED AND/OR DISCOVERED BY: NTA Monitor

ORIGINAL ADVISORY: NTA Monitor: http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200508-0142",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "juniper",
        "version": "3.1.0r4"
      },
      {
        "model": "netscreen-5gt",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "juniper",
        "version": "5.0"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "juniper",
        "version": "5.1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.8"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.7.1r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.7.1"
      },
      {
        "model": "instant virtual extranet",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "neoteris",
        "version": "3.2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r7"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.8_r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3_r1.1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.3r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.0.1_r8"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "1.73_r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.3r1"
      },
      {
        "model": "netscreen-sa 5020 series",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netscreen",
        "version": "4.2_r2.2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r9"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r7"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.3r2"
      },
      {
        "model": "netscreen-idp 100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1_r1"
      },
      {
        "model": "ns-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netscreen",
        "version": "4110.0_11_4.0_r10.0"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0"
      },
      {
        "model": "netscreen-sa 5050 series",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netscreen",
        "version": "4.2_r2.2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r11"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.0"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r5"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "1.73_r1"
      },
      {
        "model": "ns-50ns25",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netscreen",
        "version": "5.0.0_r6.0"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r5"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1r5"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r7"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.1r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "5.2.0"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r6"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3r2"
      },
      {
        "model": "netscreen-idp",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.10_r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1r4"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3r4"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r4"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r12"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.1r10"
      },
      {
        "model": "ns-204",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netscreen",
        "version": "5.0.0_r6.0"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r8"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3r5"
      },
      {
        "model": "netscreen-idp 500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1_r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.1"
      },
      {
        "model": "instant virtual extranet",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "neoteris",
        "version": "3.3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "1.7"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.5r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r11"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r9"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r4"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.0r2"
      },
      {
        "model": "instant virtual extranet",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "neoteris",
        "version": "3.3.1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.5r6"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1r3"
      },
      {
        "model": "ns-100",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netscreen",
        "version": "3.0_.pe1.0"
      },
      {
        "model": "instant virtual extranet",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "neoteris",
        "version": "3.1"
      },
      {
        "model": "netscreen-idp 10",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1_r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r11"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.1_r6"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.1r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r8"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.5r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "1.66"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3r7"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.1r7"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.10_r4"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.0"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.1r9"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.3r4"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "5.1.0"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r12"
      },
      {
        "model": "ns-500",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netscreen",
        "version": "4110.0_11_5.1.0_r3a"
      },
      {
        "model": "netscreen-idp",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r9"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r12"
      },
      {
        "model": "netscreen-idp 1000",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1_r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r6"
      },
      {
        "model": "netscreen-sa 5000 series",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netscreen",
        "version": "*"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.1_r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.1r6"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r2"
      },
      {
        "model": "instant virtual extranet",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "neoteris",
        "version": "3.0"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r5"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r10"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.1r4"
      },
      {
        "model": "ns-10",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netscreen",
        "version": "*"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3r6"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.1r1"
      },
      {
        "model": "ns-204",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netscreen",
        "version": "0110.0_11_4.0_r10.0"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r8"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r10"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.1r5"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.1r8"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.7.1r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.0r1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "5.0.0"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "5.1.0r3a"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "1.64"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r6"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.6.1r10"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "1.66_r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "4.0.0r2"
      },
      {
        "model": "netscreen-idp",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.0r4"
      },
      {
        "model": "ns-204",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netscreen",
        "version": "0110.0_11_5.1.0_r3a"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.0r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1r7"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.1r6"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.1_r7"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.7.1r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "2.5"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r2"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.1.0r3"
      },
      {
        "model": "netscreen screenos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "juniper",
        "version": "3.0.3r8"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "juniper",
        "version": "2.8"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "juniper",
        "version": "3.0"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "juniper",
        "version": "3.1"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "juniper",
        "version": "4.0"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "juniper",
        "version": "5.0"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "juniper",
        "version": "5.2"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "1.66"
      },
      {
        "model": "screenos r12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "ns-100 .pe1.0",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0"
      },
      {
        "model": "netscreen-idp r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "5003.0.1"
      },
      {
        "model": "screenos r10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "1.66"
      },
      {
        "model": "ns-10",
        "scope": null,
        "trust": 0.3,
        "vendor": "netscreen",
        "version": null
      },
      {
        "model": "screenos r8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "netscreen-idp r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "1003.0"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos r11",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "netscreen-idp r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "10003.0.1"
      },
      {
        "model": "netscreen-idp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "103.0"
      },
      {
        "model": "screenos r6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.5"
      },
      {
        "model": "screenos .0r3a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "5.1"
      },
      {
        "model": "screenos r5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0"
      },
      {
        "model": "instant virtual extranet",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0"
      },
      {
        "model": "screenos r8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "netscreen-idp r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "103.0.1"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "screenos r5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.8"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.2"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "instant virtual extranet",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "netscreen-idp r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "1003.0"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.1"
      },
      {
        "model": "ns-204 [version 0110 - ] r10.0",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "netscreen-idp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "5003.0"
      },
      {
        "model": "netscreen-idp r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "103.0"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "screenos r7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.7.1"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "1.7"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "1.64"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.2"
      },
      {
        "model": "screenos r6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.7.1"
      },
      {
        "model": "screenos r7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.1"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.10"
      },
      {
        "model": "netscreen-idp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "10003.0"
      },
      {
        "model": "screenos r6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.7.1"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "5.0"
      },
      {
        "model": "screenos r6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "netscreen-idp r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "103.0"
      },
      {
        "model": "screenos r7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "screenos r5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.3"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "netscreen-idp r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "5003.0"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.5"
      },
      {
        "model": "screenos r6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.1"
      },
      {
        "model": "screenos r12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.3"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0"
      },
      {
        "model": "netscreen-idp r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "1003.0.1"
      },
      {
        "model": "screenos r6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "netscreen-sa series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "5000"
      },
      {
        "model": "netscreen-idp r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "10003.0"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "1.73"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1.1"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.10"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0"
      },
      {
        "model": "screenos r6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "instant virtual extranet",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.3.1"
      },
      {
        "model": "screenos r8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "netscreen-idp r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "5003.0"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.8"
      },
      {
        "model": "screenos r11",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "ns-500 [version 4110 - ] .0r3a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "5.1"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "5.2.0"
      },
      {
        "model": "netscreen-idp r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "10003.0"
      },
      {
        "model": "screenos r12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r1.1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos r9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "ns-50ns25 .0r6.0",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "5.0"
      },
      {
        "model": "instant virtual extranet",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.2"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0"
      },
      {
        "model": "netscreen-sa series .r.2.2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "50204.2"
      },
      {
        "model": "screenos r11",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "screenos r6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.5"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "screenos r8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "netscreen-sa series .r.2.2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "50504.2"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.1"
      },
      {
        "model": "instant virtual extranet",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.3"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.1"
      },
      {
        "model": "screenos r8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.0.1"
      },
      {
        "model": "ns-204 [version 0110 - ] .0r3a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "5.1"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.5"
      },
      {
        "model": "netscreen-idp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "1003.0"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.3"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.7.1"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "2.6.1"
      },
      {
        "model": "screenos r2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "1.73"
      },
      {
        "model": "screenos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.3"
      },
      {
        "model": "screenos r5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "ns-204 .0r6.0",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "5.0"
      },
      {
        "model": "screenos -dial",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "3.0.3"
      },
      {
        "model": "ns-500 [version 4110 - ] r10.0",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.3"
      },
      {
        "model": "screenos r5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0"
      },
      {
        "model": "screenos r9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      },
      {
        "model": "screenos r1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netscreen",
        "version": "4.0.1"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "14595"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000498"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-2640"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200508-259"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:neoteris:instant_virtual_extranet:3.3.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.64:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.66:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.1_r6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.1_r7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3_r1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:dial:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:netscreen:ns-10:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:netscreen:ns-100:3.0_.pe1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.73_r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.73_r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.5r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.5r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.66_r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:1.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.10_r4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.8_r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:netscreen:ns-204:0110.0_11_4.0_r10.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:netscreen:ns-204:0110.0_11_5.1.0_r3a:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:netscreen:ns-204:5.0.0_r6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:netscreen:ns-500:4110.0_11_4.0_r10.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.0.1_r8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.5r6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.1_r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0r3a:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:netscreen:ns-500:4110.0_11_5.1.0_r3a:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:netscreen:ns-50ns25:5.0.0_r6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:juniper:netscreen-5gt:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:juniper:netscreen-idp_500:3.0.1_r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:netscreen:netscreen-sa_5000_series:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:juniper:netscreen-idp:3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:juniper:netscreen-idp:3.0r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:netscreen:netscreen-sa_5020_series:4.2_r2.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:netscreen:netscreen-sa_5050_series:4.2_r2.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:juniper:netscreen-idp:3.0r2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:juniper:netscreen-idp_10:3.0.1_r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:juniper:netscreen-idp_100:3.0.1_r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:juniper:netscreen-idp_1000:3.0.1_r1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-2640"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Roy Hills  Roy.Hills@nta-monitor.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200508-259"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2005-2640",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2005-2640",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-13849",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2005-2640",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200508-259",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-13849",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-13849"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000498"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-2640"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200508-259"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid. NetScreen ScreenOS of IKE In the protocol implementation, IKE User name included in aggressive mode messages (IKE ID) Is valid VPN There are vulnerabilities that respond differently depending on whether you are a user.An effective VPN You may get your username and password hash.  This allows for attackers to obtain a list of valid VPN users.  With a valid username, an attacker  can obtain hashed credentials against which a brute force attack may be performed.   A successful crack would mean that the attacker has complete access to the network. Netscreen is one of Juniper\u0027s leading line of networking and security products. Juniper Netscreen\u0027s integrated firewall/VPN product has a VPN user name enumeration vulnerability when performing VPN security tests for customers. Once a username is discovered, an attacker can use that username to get a hash from Netscreen and then crack the associated password offline. \n\n----------------------------------------------------------------------\n\nBist Du interessiert an einem neuen Job in IT-Sicherheit?\n\n\nSecunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-\nSicherheit:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nJuniper Netscreen IPSec VPN Username Enumeration Weakness\n\nSECUNIA ADVISORY ID:\nSA16474\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/16474/\n\nCRITICAL:\nNot critical\n\nIMPACT:\nExposure of system information\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nNetScreen ScreenOS 5.x\nhttp://secunia.com/product/2569/\nNetScreen ScreenOS 4.x\nhttp://secunia.com/product/695/\nNetScreen ScreenOS 3.x\nhttp://secunia.com/product/798/\nNetScreen ScreenOS 2.x\nhttp://secunia.com/product/1395/\n\nDESCRIPTION:\nNTA Monitor has reported a weakness in Juniper Netscreen VPN, which\ncan be exploited by malicious people to gain knowledge of certain\ninformation. \n\nThe weakness is caused due to the device returning different\nresponses depending on whether or not a valid username is supplied. \nThis can be exploited to enumerate valid usernames, which can be used\nto obtain password hashes. \n\nThe weakness has been reported in ScreenOS software versions up to\n5.2.0. \n\nSOLUTION:\nUse certificate authentication instead of pre-shared key\nauthentication. \n\nPROVIDED AND/OR DISCOVERED BY:\nNTA Monitor\n\nORIGINAL ADVISORY:\nNTA Monitor:\nhttp://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-2640"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000498"
      },
      {
        "db": "BID",
        "id": "14595"
      },
      {
        "db": "VULHUB",
        "id": "VHN-13849"
      },
      {
        "db": "PACKETSTORM",
        "id": "39477"
      }
    ],
    "trust": 2.07
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-13849",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-13849"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "14595",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "16474",
        "trust": 2.6
      },
      {
        "db": "NVD",
        "id": "CVE-2005-2640",
        "trust": 2.5
      },
      {
        "db": "SECTRACK",
        "id": "1014728",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000498",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200508-259",
        "trust": 0.7
      },
      {
        "db": "BUGTRAQ",
        "id": "20050818 JUNIPER NETSCREEN VPN USERNAME ENUMERATION VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-79814",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "26168",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-13849",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "39477",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-13849"
      },
      {
        "db": "BID",
        "id": "14595"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000498"
      },
      {
        "db": "PACKETSTORM",
        "id": "39477"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-2640"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200508-259"
      }
    ]
  },
  "id": "VAR-200508-0142",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-13849"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T13:30:56.840000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "5212",
        "trust": 0.8,
        "url": "https://www.juniper.net/support/security/alerts/adv5212.txt"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000498"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-2640"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://secunia.com/advisories/16474/"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/14595"
      },
      {
        "trust": 1.8,
        "url": "http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1014728"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=112438068426034\u0026w=2"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-2640"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-2640"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=112438068426034\u0026w=2"
      },
      {
        "trust": 0.3,
        "url": "http://www.juniper.net/"
      },
      {
        "trust": 0.3,
        "url": "http://www.netscreen.com/index.html"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/408478"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=112438068426034\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/1395/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/695/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_vacancies/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/798/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/2569/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-13849"
      },
      {
        "db": "BID",
        "id": "14595"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000498"
      },
      {
        "db": "PACKETSTORM",
        "id": "39477"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-2640"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200508-259"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-13849"
      },
      {
        "db": "BID",
        "id": "14595"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000498"
      },
      {
        "db": "PACKETSTORM",
        "id": "39477"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-2640"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200508-259"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-08-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-13849"
      },
      {
        "date": "2005-08-18T00:00:00",
        "db": "BID",
        "id": "14595"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2005-000498"
      },
      {
        "date": "2005-08-19T04:15:49",
        "db": "PACKETSTORM",
        "id": "39477"
      },
      {
        "date": "2005-08-23T04:00:00",
        "db": "NVD",
        "id": "CVE-2005-2640"
      },
      {
        "date": "2005-08-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200508-259"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-10-18T00:00:00",
        "db": "VULHUB",
        "id": "VHN-13849"
      },
      {
        "date": "2005-08-18T00:00:00",
        "db": "BID",
        "id": "14595"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2005-000498"
      },
      {
        "date": "2016-10-18T03:29:16.917000",
        "db": "NVD",
        "id": "CVE-2005-2640"
      },
      {
        "date": "2007-02-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200508-259"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200508-259"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Juniper Netscreen VPN Username Enumeration Vulnerability",
    "sources": [
      {
        "db": "BID",
        "id": "14595"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200508-259"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "14595"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200508-259"
      }
    ],
    "trust": 0.9
  }
}