5 results (0.004 seconds)

CVSS: 5.0EPSS: 3%CPEs: 133EXPL: 3

Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid. • https://www.exploit-db.com/exploits/26168 http://marc.info/?l=bugtraq&m=112438068426034&w=2 http://secunia.com/advisories/16474 http://securitytracker.com/id?1014728 http://www.nta-monitor.com/news/vpn-flaws/juniper/netscreen/index.htm http://www.securityfocus.com/bid/14595 •

CVSS: 6.0EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in delhomepage.cgi in NetScreen-SA 5000 Series running firmware 3.3 Patch 1 (build 4797) allows remote authenticated users to execute arbitrary script as other users via the row parameter. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018120.html http://marc.info/?l=bugtraq&m=107826362024112&w=2 http://marc.info/?l=bugtraq&m=107850564102190&w=2 http://www.kb.cert.org/vuls/id/114070 http://www.securityfocus.com/bid/9791 https://exchange.xforce.ibmcloud.com/vulnerabilities/15368 •

CVSS: 4.3EPSS: 56%CPEs: 5EXPL: 0

NetScreen ScreenOS before 4.0.1 allows remote attackers to bypass the Malicious-URL blocking feature by splitting the URL into fragmented IP requests. • http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0093.html http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0094.html http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-11/0338.html http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-11/0347.html http://www.iss.net/security_center/static/10699.php http://www.securityfocus.com/bid/6245 • CWE-16: Configuration •

CVSS: 5.0EPSS: 1%CPEs: 4EXPL: 0

NetScreen ScreenOS 2.8 through 4.0, when forwarding H.323 or Netmeeting traffic, allows remote attackers to cause a denial of service (firewall session table consumption) by establishing multiple half-open H.323 sessions, which are not cleaned up on garbage removal and do not time out for 36 hours. • http://marc.info/?l=bugtraq&m=103827647621729&w=2 http://www.securityfocus.com/bid/6250 https://exchange.xforce.ibmcloud.com/vulnerabilities/10700 •

CVSS: 5.0EPSS: 2%CPEs: 4EXPL: 3

Buffer overflow in NetScreen Firewall WebUI allows remote attackers to cause a denial of service via a long URL request to the web administration interface. • https://www.exploit-db.com/exploits/20532 http://www.osvdb.org/1707 http://www.securityfocus.com/archive/1/155149 http://www.securityfocus.com/bid/2176 https://exchange.xforce.ibmcloud.com/vulnerabilities/5908 •