Page 3 of 12 results (0.001 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

NetScreen ScreenOS before 2.6.1 does not support a maximum number of concurrent sessions for a system, which allows an attacker on the trusted network to cause a denial of service (resource exhaustion) via a port scan to an external network, which consumes all available connections. NetScreen ScreenOS anteriores a 2.6.1 no soporta el establecimiento de un número máximo de sesiones concurrentes para un sistema, lo que permite a un atacante en la red de confianza causar una denegación de servicio (agotamiento de recursos) mediante un escaneo de puertos a una red externa, lo que consume todas las conexiones disponibles. • http://marc.info/?l=bugtraq&m=101258281818524&w=2 http://marc.info/?l=bugtraq&m=101258887105690&w=2 http://online.securityfocus.com/archive/1/254268 http://www.iss.net/security_center/static/8057.php http://www.securityfocus.com/bid/4015 •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

NetScreen ScreenOS prior to 2.5r6 on the NetScreen-10 and Netscreen-100 can allow a local attacker to bypass the DMZ 'denial' policy via specific traffic patterns. • http://archives.neohapsis.com/archives/bugtraq/2001-03/0375.html http://www.osvdb.org/1780 http://www.securityfocus.com/bid/2523 https://exchange.xforce.ibmcloud.com/vulnerabilities/6317 •