var-200902-0202
Vulnerability from variot
Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page. ScreenOS is prone to an HTML-injection vulnerability because its administrative web interface fails to sufficiently sanitize user-supplied input data. Attacker-supplied HTML and script code would run in the context of the affected application, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible. The issue affects ScreenOS 5.4.0r9.0. Juniper NetScreen ScreenOS is the core operating system of NetScreen firewall and other network products. Juniper NetScreen ScreenOS versions earlier than 5.4r10, 6.0r6 and 6.1r2 have a cross-site scripting vulnerability. ----------------------------------------------------------------------
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/
TITLE: Juniper NetScreen ScreenOS Script Insertion Vulnerability
SECUNIA ADVISORY ID: SA32078
VERIFY ADVISORY: http://secunia.com/advisories/32078/
CRITICAL: Moderately critical
IMPACT: Cross Site Scripting
WHERE:
From remote
OPERATING SYSTEM: NetScreen ScreenOS 5.x http://secunia.com/advisories/product/2569/ NetScreen ScreenOS 6.x http://secunia.com/advisories/product/18925/
DESCRIPTION: A vulnerability has been reported in Juniper NetScreen ScreenOS, which can be exploited by malicious people to conduct script insertion attacks. This can be exploited to insert arbitrary HTML and script code, which will be executed in another user's browser session in context of the web interface when the event logs are viewed.
The vulnerability is reported in version 5.4.0r9.0 and reportedly also affects versions prior to 6.0r6 and 6.1r2.
SOLUTION: Update to version 5.4r10, 6.0r6, or 6.1r2.
PROVIDED AND/OR DISCOVERED BY: Deral Heiland, Layered Defense
ORIGINAL ADVISORY: Layered Defense: http://www.layereddefense.com/netscreen01oct.html
Juniper (login required): https://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumber=PSN-2008-09-009&viewMode=view
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200902-0202", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "2.6.1r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "2.6.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "2.0.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "2.5.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "2.6.1r9" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "1.6.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "2.6.1r8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "6.0.0r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "2.6.1r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "6.1.0r2" }, { "model": "netscreen screenos", "scope": "lte", "trust": 1.0, "vendor": "juniper", "version": "5.4.0r9.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.7.1r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.7.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.4.0r8a" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.2.0r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.3.0r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.0.0r10" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.4.0r8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r9" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.1.0r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.0.0r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.3.0r10" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.0.0r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r11" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.1.0r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.4.0r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.0.0r9" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.4.0r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.2.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.0.0r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r10" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r12" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.3.0r8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r11" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.0r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3r9" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.3.0r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.1.0r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r11" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.0.0r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.3.0r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.4.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r9" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.1.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.2.0r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r1.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r12" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.0.0r11" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r9" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r12" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.0.0r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.3.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r10" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.3.0r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r10" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.4.0r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.1r8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.7.1r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.0r1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.0.0r8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.0.0r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.0.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.4.0r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.4.0r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3r8" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.2.0r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.6.1r10" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.0r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "4.0.3r5" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.3.0r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.3.0r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.0r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.3.0r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.4.0r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.0r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.1.0r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r7" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.3.0r9" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.1r6" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.7.0" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "2.7.1r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.0.0r4" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r2" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "5.4.0r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.1.0r3" }, { "model": "netscreen screenos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "3.0.3r8" }, { "model": "screenos", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "5.4r10" }, { "model": "screenos", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "6.0r6" }, { "model": "screenos", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "6.1r2" }, { "model": "networks screenos r9.0", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "5.4" }, { "model": "networks screenos r2", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": "6.1" }, { "model": "networks screenos r6", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": "6.0" }, { "model": "networks screenos r10", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": "5.4" } ], "sources": [ { "db": "BID", "id": "31528" }, { "db": "JVNDB", "id": "JVNDB-2009-001003" }, { "db": "NVD", "id": "CVE-2008-6096" }, { "db": "CNNVD", "id": "CNNVD-200902-162" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.2.0r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.2.0r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:dial:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:6.0.0r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:juniper:netscreen_screenos:1.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.1r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:6.1.0r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.4.0r9.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0r8a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.4.0r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.3.0r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.2.0r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.1.0r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:5.0.0r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.1r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0:*:dial2:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:4.0.0r6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.0.3r1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:3.1.0r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1r3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.1r7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:netscreen_screenos:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2008-6096" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Deral Heiland", "sources": [ { "db": "BID", "id": "31528" } ], "trust": 0.3 }, "cve": "CVE-2008-6096", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2008-6096", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-36221", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2008-6096", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200902-162", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-36221", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-36221" }, { "db": "JVNDB", "id": "JVNDB-2009-001003" }, { "db": "NVD", "id": "CVE-2008-6096" }, { "db": "CNNVD", "id": "CNNVD-200902-162" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page. ScreenOS is prone to an HTML-injection vulnerability because its administrative web interface fails to sufficiently sanitize user-supplied input data. \nAttacker-supplied HTML and script code would run in the context of the affected application, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible. \nThe issue affects ScreenOS 5.4.0r9.0. Juniper NetScreen ScreenOS is the core operating system of NetScreen firewall and other network products. Juniper NetScreen ScreenOS versions earlier than 5.4r10, 6.0r6 and 6.1r2 have a cross-site scripting vulnerability. ----------------------------------------------------------------------\n\nDo you need accurate and reliable IDS / IPS / AV detection rules?\n\nGet in-depth vulnerability details:\nhttp://secunia.com/binary_analysis/sample_analysis/\n\n----------------------------------------------------------------------\n\nTITLE:\nJuniper NetScreen ScreenOS Script Insertion Vulnerability\n\nSECUNIA ADVISORY ID:\nSA32078\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/32078/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nCross Site Scripting\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nNetScreen ScreenOS 5.x\nhttp://secunia.com/advisories/product/2569/\nNetScreen ScreenOS 6.x\nhttp://secunia.com/advisories/product/18925/\n\nDESCRIPTION:\nA vulnerability has been reported in Juniper NetScreen ScreenOS,\nwhich can be exploited by malicious people to conduct script\ninsertion attacks. This can\nbe exploited to insert arbitrary HTML and script code, which will be\nexecuted in another user\u0027s browser session in context of the web\ninterface when the event logs are viewed. \n\nThe vulnerability is reported in version 5.4.0r9.0 and reportedly\nalso affects versions prior to 6.0r6 and 6.1r2. \n\nSOLUTION:\nUpdate to version 5.4r10, 6.0r6, or 6.1r2. \n\nPROVIDED AND/OR DISCOVERED BY:\nDeral Heiland, Layered Defense\n\nORIGINAL ADVISORY:\nLayered Defense:\nhttp://www.layereddefense.com/netscreen01oct.html\n\nJuniper (login required):\nhttps://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search\u0026txtAlertNumber=PSN-2008-09-009\u0026viewMode=view\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-6096" }, { "db": "JVNDB", "id": "JVNDB-2009-001003" }, { "db": "BID", "id": "31528" }, { "db": "VULHUB", "id": "VHN-36221" }, { "db": "PACKETSTORM", "id": "70555" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "31528", "trust": 2.8 }, { "db": "NVD", "id": "CVE-2008-6096", "trust": 2.8 }, { "db": "SECUNIA", "id": "32078", "trust": 2.6 }, { "db": "VUPEN", "id": "ADV-2008-2713", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2009-001003", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200902-162", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-36221", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "70555", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-36221" }, { "db": "BID", "id": "31528" }, { "db": "JVNDB", "id": "JVNDB-2009-001003" }, { "db": "PACKETSTORM", "id": "70555" }, { "db": "NVD", "id": "CVE-2008-6096" }, { "db": "CNNVD", "id": "CNNVD-200902-162" } ] }, "id": "VAR-200902-0202", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-36221" } ], "trust": 0.73095236 }, "last_update_date": "2023-12-18T13:58:09.856000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "PSN-2008-09-009", "trust": 0.8, "url": "https://www.juniper.net/alerts/viewalert.jsp?actionbtn=search\u0026txtalertnumber=psn-2008-09-009\u0026viewmode=view" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001003" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-36221" }, { "db": "JVNDB", "id": "JVNDB-2009-001003" }, { "db": "NVD", "id": "CVE-2008-6096" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/31528" }, { "trust": 2.1, "url": "http://www.layereddefense.com/netscreen01oct.html" }, { "trust": 1.9, "url": "http://www.vupen.com/english/advisories/2008/2713" }, { "trust": 1.7, "url": "http://secunia.com/advisories/32078" }, { "trust": 0.9, "url": "http://secunia.com/advisories/32078/" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-6096" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-6096" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/2713" }, { "trust": 0.3, "url": "http://www.juniper.net/" }, { "trust": 0.3, "url": "/archive/1/496931" }, { "trust": 0.1, "url": "https://www.juniper.net/alerts/viewalert.jsp?actionbtn=search\u0026txtalertnumber=psn-2008-09-009\u0026viewmode=view" }, { "trust": 0.1, "url": "http://secunia.com/binary_analysis/sample_analysis/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/18925/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/2569/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-36221" }, { "db": "BID", "id": "31528" }, { "db": "JVNDB", "id": "JVNDB-2009-001003" }, { "db": "PACKETSTORM", "id": "70555" }, { "db": "NVD", "id": "CVE-2008-6096" }, { "db": "CNNVD", "id": "CNNVD-200902-162" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-36221" }, { "db": "BID", "id": "31528" }, { "db": "JVNDB", "id": "JVNDB-2009-001003" }, { "db": "PACKETSTORM", "id": "70555" }, { "db": "NVD", "id": "CVE-2008-6096" }, { "db": "CNNVD", "id": "CNNVD-200902-162" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-02-09T00:00:00", "db": "VULHUB", "id": "VHN-36221" }, { "date": "2008-10-01T00:00:00", "db": "BID", "id": "31528" }, { "date": "2009-02-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-001003" }, { "date": "2008-10-02T21:01:10", "db": "PACKETSTORM", "id": "70555" }, { "date": "2009-02-09T17:30:00.297000", "db": "NVD", "id": "CVE-2008-6096" }, { "date": "2009-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-200902-162" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-03-08T00:00:00", "db": "VULHUB", "id": "VHN-36221" }, { "date": "2015-04-16T17:53:00", "db": "BID", "id": "31528" }, { "date": "2009-02-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-001003" }, { "date": "2011-03-08T03:15:43.597000", "db": "NVD", "id": "CVE-2008-6096" }, { "date": "2009-02-12T00:00:00", "db": "CNNVD", "id": "CNNVD-200902-162" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200902-162" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juniper NetScreen ScreenOS Vulnerable to cross-site scripting", "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001003" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-200902-162" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.