CVE-2002-1547
https://notcve.org/view.php?id=CVE-2002-1547
Netscreen running ScreenOS 4.0.0r6 and earlier allows remote attackers to cause a denial of service via a malformed SSH packet to the Secure Command Shell (SCS) management interface, as demonstrated via certain CRC32 exploits, a different vulnerability than CVE-2001-0144. • http://archives.neohapsis.com/archives/bugtraq/2002-10/0443.html http://archives.neohapsis.com/archives/bugtraq/2002-10/0446.html http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0053.html http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0054.html http://www.iss.net/security_center/static/10528.php http://www.kb.cert.org/vuls/id/930161 http://www.netscreen.com/support/alerts/11_06_02.html http://www.osvdb.org/4376 •
CVE-2002-2150
https://notcve.org/view.php?id=CVE-2002-2150
Firewalls from multiple vendors empty state tables more slowly than they are filled, which allows remote attackers to flood state tables with packet flooding attacks such as (1) TCP SYN flood, (2) UDP flood, or (3) Crikey CRC Flood, which causes the firewall to refuse any new connections. • http://www.iss.net/security_center/static/10449.php http://www.kb.cert.org/vuls/id/539363 http://www.securityfocus.com/bid/6023 •
CVE-2002-0891
https://notcve.org/view.php?id=CVE-2002-0891
The web interface (WebUI) of NetScreen ScreenOS before 2.6.1r8, and certain 2.8.x and 3.0.x versions before 3.0.3r1, allows remote attackers to cause a denial of service (crash) via a long user name. El Interfaz web (WebUI) de NetScreen ScreenOS desde la 2.6.1r8 a la anterior a la 3.1.0r1 permite a atacantes remotos causar la Denegación de Servicios (por caida), mediante un nombre largo de usuario. • http://online.securityfocus.com/archive/1/274240 http://www.iss.net/security_center/static/9186.php http://www.netscreen.com/support/ns25_reboot.html http://www.securityfocus.com/bid/4842 •
CVE-2002-0234
https://notcve.org/view.php?id=CVE-2002-0234
NetScreen ScreenOS before 2.6.1 does not support a maximum number of concurrent sessions for a system, which allows an attacker on the trusted network to cause a denial of service (resource exhaustion) via a port scan to an external network, which consumes all available connections. NetScreen ScreenOS anteriores a 2.6.1 no soporta el establecimiento de un número máximo de sesiones concurrentes para un sistema, lo que permite a un atacante en la red de confianza causar una denegación de servicio (agotamiento de recursos) mediante un escaneo de puertos a una red externa, lo que consume todas las conexiones disponibles. • http://marc.info/?l=bugtraq&m=101258281818524&w=2 http://marc.info/?l=bugtraq&m=101258887105690&w=2 http://online.securityfocus.com/archive/1/254268 http://www.iss.net/security_center/static/8057.php http://www.securityfocus.com/bid/4015 •
CVE-2001-0589
https://notcve.org/view.php?id=CVE-2001-0589
NetScreen ScreenOS prior to 2.5r6 on the NetScreen-10 and Netscreen-100 can allow a local attacker to bypass the DMZ 'denial' policy via specific traffic patterns. • http://archives.neohapsis.com/archives/bugtraq/2001-03/0375.html http://www.osvdb.org/1780 http://www.securityfocus.com/bid/2523 https://exchange.xforce.ibmcloud.com/vulnerabilities/6317 •