
CVE-2008-6096
https://notcve.org/view.php?id=CVE-2008-6096
09 Feb 2009 — Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page. Múltiples vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados (XSS) en Juniper NetScreen ScreenOS anteriores a v5.4r10, v6.0r6, y v6.1r2, permite a atacantes remotos inyectar secuencias de comandos web o HTML mediante el parámetr... • http://secunia.com/advisories/32078 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2005-2640 – Juniper NetScreen 5.0 - VPN 'Username' Enumeration
https://notcve.org/view.php?id=CVE-2005-2640
20 Aug 2005 — Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid. • https://www.exploit-db.com/exploits/26168 •

CVE-2004-1446
https://notcve.org/view.php?id=CVE-2004-1446
31 Dec 2004 — Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet. • http://secunia.com/advisories/12208 •

CVE-2002-1547
https://notcve.org/view.php?id=CVE-2002-1547
31 Mar 2003 — Netscreen running ScreenOS 4.0.0r6 and earlier allows remote attackers to cause a denial of service via a malformed SSH packet to the Secure Command Shell (SCS) management interface, as demonstrated via certain CRC32 exploits, a different vulnerability than CVE-2001-0144. • http://archives.neohapsis.com/archives/bugtraq/2002-10/0443.html •

CVE-2002-2150
https://notcve.org/view.php?id=CVE-2002-2150
31 Dec 2002 — Firewalls from multiple vendors empty state tables more slowly than they are filled, which allows remote attackers to flood state tables with packet flooding attacks such as (1) TCP SYN flood, (2) UDP flood, or (3) Crikey CRC Flood, which causes the firewall to refuse any new connections. • http://www.iss.net/security_center/static/10449.php •