CVE-2005-2640 – Juniper NetScreen 5.0 - VPN 'Username' Enumeration
https://notcve.org/view.php?id=CVE-2005-2640
Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid. • https://www.exploit-db.com/exploits/26168 http://marc.info/?l=bugtraq&m=112438068426034&w=2 http://secunia.com/advisories/16474 http://securitytracker.com/id?1014728 http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm http://www.securityfocus.com/bid/14595 •
CVE-2004-0347
https://notcve.org/view.php?id=CVE-2004-0347
Cross-site scripting (XSS) vulnerability in delhomepage.cgi in NetScreen-SA 5000 Series running firmware 3.3 Patch 1 (build 4797) allows remote authenticated users to execute arbitrary script as other users via the row parameter. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018120.html http://marc.info/?l=bugtraq&m=107826362024112&w=2 http://marc.info/?l=bugtraq&m=107850564102190&w=2 http://www.kb.cert.org/vuls/id/114070 http://www.securityfocus.com/bid/9791 https://exchange.xforce.ibmcloud.com/vulnerabilities/15368 •
CVE-2002-2234
https://notcve.org/view.php?id=CVE-2002-2234
NetScreen ScreenOS before 4.0.1 allows remote attackers to bypass the Malicious-URL blocking feature by splitting the URL into fragmented IP requests. • http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0093.html http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0094.html http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-11/0338.html http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-11/0347.html http://www.iss.net/security_center/static/10699.php http://www.securityfocus.com/bid/6245 • CWE-16: Configuration •
CVE-2002-2266
https://notcve.org/view.php?id=CVE-2002-2266
NetScreen ScreenOS 2.8 through 4.0, when forwarding H.323 or Netmeeting traffic, allows remote attackers to cause a denial of service (firewall session table consumption) by establishing multiple half-open H.323 sessions, which are not cleaned up on garbage removal and do not time out for 36 hours. • http://marc.info/?l=bugtraq&m=103827647621729&w=2 http://www.securityfocus.com/bid/6250 https://exchange.xforce.ibmcloud.com/vulnerabilities/10700 •
CVE-2001-0007 – ScreenOS 1.73/2.x - Firewall Denial of Service
https://notcve.org/view.php?id=CVE-2001-0007
Buffer overflow in NetScreen Firewall WebUI allows remote attackers to cause a denial of service via a long URL request to the web administration interface. • https://www.exploit-db.com/exploits/20532 http://www.osvdb.org/1707 http://www.securityfocus.com/archive/1/155149 http://www.securityfocus.com/bid/2176 https://exchange.xforce.ibmcloud.com/vulnerabilities/5908 •