5 results (0.006 seconds)

CVSS: 4.3EPSS: 0%CPEs: 141EXPL: 0

Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page. Múltiples vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados (XSS) en Juniper NetScreen ScreenOS anteriores a v5.4r10, v6.0r6, y v6.1r2, permite a atacantes remotos inyectar secuencias de comandos web o HTML mediante el parámetro nombre de usuario en (1) página de autenticación del interfase web o (2) la página de autenticación telnet. • http://secunia.com/advisories/32078 http://www.layereddefense.com/netscreen01oct.html http://www.securityfocus.com/bid/31528 http://www.vupen.com/english/advisories/2008/2713 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 3%CPEs: 133EXPL: 3

Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid. • https://www.exploit-db.com/exploits/26168 http://marc.info/?l=bugtraq&m=112438068426034&w=2 http://secunia.com/advisories/16474 http://securitytracker.com/id?1014728 http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm http://www.securityfocus.com/bid/14595 •

CVSS: 5.0EPSS: 1%CPEs: 106EXPL: 0

Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet. • http://secunia.com/advisories/12208 http://www.juniper.net/support/security/alerts/screenos-sshv1-2.txt http://www.kb.cert.org/vuls/id/749870 http://www.securityfocus.com/bid/10854 https://exchange.xforce.ibmcloud.com/vulnerabilities/16876 •

CVSS: 5.0EPSS: 5%CPEs: 1EXPL: 0

Netscreen running ScreenOS 4.0.0r6 and earlier allows remote attackers to cause a denial of service via a malformed SSH packet to the Secure Command Shell (SCS) management interface, as demonstrated via certain CRC32 exploits, a different vulnerability than CVE-2001-0144. • http://archives.neohapsis.com/archives/bugtraq/2002-10/0443.html http://archives.neohapsis.com/archives/bugtraq/2002-10/0446.html http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0053.html http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0054.html http://www.iss.net/security_center/static/10528.php http://www.kb.cert.org/vuls/id/930161 http://www.netscreen.com/support/alerts/11_06_02.html http://www.osvdb.org/4376 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

NetScreen ScreenOS before 2.6.1 does not support a maximum number of concurrent sessions for a system, which allows an attacker on the trusted network to cause a denial of service (resource exhaustion) via a port scan to an external network, which consumes all available connections. NetScreen ScreenOS anteriores a 2.6.1 no soporta el establecimiento de un número máximo de sesiones concurrentes para un sistema, lo que permite a un atacante en la red de confianza causar una denegación de servicio (agotamiento de recursos) mediante un escaneo de puertos a una red externa, lo que consume todas las conexiones disponibles. • http://marc.info/?l=bugtraq&m=101258281818524&w=2 http://marc.info/?l=bugtraq&m=101258887105690&w=2 http://online.securityfocus.com/archive/1/254268 http://www.iss.net/security_center/static/8057.php http://www.securityfocus.com/bid/4015 •