9 results (0.013 seconds)

CVSS: 9.3EPSS: 2%CPEs: 1EXPL: 0

08 Jan 2016 — Juniper ScreenOS before 6.3.0r21, when ssh-pka is configured and enabled, allows remote attackers to cause a denial of service (system crash) or execute arbitrary code via crafted SSH negotiation. Juniper ScreenOS en versiones anteriores a 6.3.0r21, cuando ssh-pka está configurado y habilitado, permite a atacantes remotos causar una denegación de servicio (caída de sistema) o ejecutar código arbitrario a través de una negociación SSH manipulada. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10712 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

19 Oct 2015 — The L2TP packet processing functionality in Juniper Netscreen and ScreenOS Firewall products with ScreenOS before 6.3.0r13-dnd1, 6.3.0r14 through 6.3.0r18 before 6.3.0r18-dnc1, and 6.3.0r19 allows remote attackers to cause a denial of service via a crafted L2TP packet. La funcionalidad de procesamiento de paquete de L2TP en Juniper Netscreen y productos de ScreenOS Firewall con ScreenOS en versiones anteriores a 6.3.0r13-dnd1, 6.3.0r14 hasta la versión 6.3.0r18 en versiones anteriores a 6.3.0r18-dnc1 y 6.3.... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10704 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

13 Jun 2014 — Unspecified vulnerability in the Juniper Networks NetScreen Firewall products with ScreenOS before 6.3r17, when configured to use the internal DNS lookup client, allows remote attackers to cause a denial of service (crash and reboot) via vectors related to a DNS lookup. Vulnerabilidad no especificada en los productos de Juniper Networks NetScreen Firewall con ScreenOS anterior a 6.3r17, cuando está configurado para utilizar el cliente de búsqueda DNS interno, permite a atacantes remotos causar una denegació... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10631 •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

13 Jun 2014 — The Juniper Networks NetScreen Firewall devices with ScreenOS before 6.3r17, when configured to use the internal DNS lookup client, allows remote attackers to cause a denial of service (crash and reboot) via a sequence of malformed packets to the device IP. Los dispositivos Juniper Networks NetScreen Firewall con ScreenOS anterior a 6.3r17, cuando configurados para utilizar el cliente de búsqueda DNS interno, permite a atacantes remotos causar una denegación de servicio (caída y reinicio) a través de una se... • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10632 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

15 Apr 2014 — Juniper ScreenOS 6.3 and earlier allows remote attackers to cause a denial of service (crash and restart or failover) via a malformed SSL/TLS packet. Juniper ScreenOS 6.3 y anteriores permite a atacantes remotos causar una denegación de servicio (caída y reinicio o recuperación de sesión ante fallos) a través de un paquete SSL/TLS malformado. • http://secunia.com/advisories/57910 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 67EXPL: 0

23 Jan 2014 — The OSPF implementation in Juniper Junos through 13.x, JunosE, and ScreenOS through 6.3.x does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149. La implementación de OSPF en Juniper Junos hasta la versión 13.x, JunosE, y ScreenO... • http://www.kb.cert.org/vuls/id/229804 •

CVSS: 5.3EPSS: 5%CPEs: 133EXPL: 3

20 Aug 2005 — Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid. • https://www.exploit-db.com/exploits/26168 •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

31 Dec 2002 — NetScreen ScreenOS before 4.0.1 allows remote attackers to bypass the Malicious-URL blocking feature by splitting the URL into fragmented IP requests. • http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0093.html • CWE-16: Configuration •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

31 Dec 2002 — NetScreen ScreenOS 2.8 through 4.0, when forwarding H.323 or Netmeeting traffic, allows remote attackers to cause a denial of service (firewall session table consumption) by establishing multiple half-open H.323 sessions, which are not cleaned up on garbage removal and do not time out for 36 hours. • http://marc.info/?l=bugtraq&m=103827647621729&w=2 •