Page 4 of 17 results (0.003 seconds)

CVSS: 4.3EPSS: 56%CPEs: 5EXPL: 0

NetScreen ScreenOS before 4.0.1 allows remote attackers to bypass the Malicious-URL blocking feature by splitting the URL into fragmented IP requests. • http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0093.html http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0094.html http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-11/0338.html http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-11/0347.html http://www.iss.net/security_center/static/10699.php http://www.securityfocus.com/bid/6245 • CWE-16: Configuration •

CVSS: 5.0EPSS: 1%CPEs: 4EXPL: 0

NetScreen ScreenOS 2.8 through 4.0, when forwarding H.323 or Netmeeting traffic, allows remote attackers to cause a denial of service (firewall session table consumption) by establishing multiple half-open H.323 sessions, which are not cleaned up on garbage removal and do not time out for 36 hours. • http://marc.info/?l=bugtraq&m=103827647621729&w=2 http://www.securityfocus.com/bid/6250 https://exchange.xforce.ibmcloud.com/vulnerabilities/10700 •