Page 2 of 8 results (0.008 seconds)

CVSS: 5.0EPSS: 1%CPEs: 23EXPL: 0

The web interface (WebUI) of NetScreen ScreenOS before 2.6.1r8, and certain 2.8.x and 3.0.x versions before 3.0.3r1, allows remote attackers to cause a denial of service (crash) via a long user name. El Interfaz web (WebUI) de NetScreen ScreenOS desde la 2.6.1r8 a la anterior a la 3.1.0r1 permite a atacantes remotos causar la Denegación de Servicios (por caida), mediante un nombre largo de usuario. • http://online.securityfocus.com/archive/1/274240 http://www.iss.net/security_center/static/9186.php http://www.netscreen.com/support/ns25_reboot.html http://www.securityfocus.com/bid/4842 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

NetScreen ScreenOS before 2.6.1 does not support a maximum number of concurrent sessions for a system, which allows an attacker on the trusted network to cause a denial of service (resource exhaustion) via a port scan to an external network, which consumes all available connections. NetScreen ScreenOS anteriores a 2.6.1 no soporta el establecimiento de un número máximo de sesiones concurrentes para un sistema, lo que permite a un atacante en la red de confianza causar una denegación de servicio (agotamiento de recursos) mediante un escaneo de puertos a una red externa, lo que consume todas las conexiones disponibles. • http://marc.info/?l=bugtraq&m=101258281818524&w=2 http://marc.info/?l=bugtraq&m=101258887105690&w=2 http://online.securityfocus.com/archive/1/254268 http://www.iss.net/security_center/static/8057.php http://www.securityfocus.com/bid/4015 •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

NetScreen ScreenOS prior to 2.5r6 on the NetScreen-10 and Netscreen-100 can allow a local attacker to bypass the DMZ 'denial' policy via specific traffic patterns. • http://archives.neohapsis.com/archives/bugtraq/2001-03/0375.html http://www.osvdb.org/1780 http://www.securityfocus.com/bid/2523 https://exchange.xforce.ibmcloud.com/vulnerabilities/6317 •