Check CVE Id
Check CWE Id
A persistent cross-site scripting vulnerability in the graphical user interface of ScreenOS may allow a remote authenticated user to inject web script or HTML and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. Affected releases are Juniper Networks ScreenOS 6.3.0 versions prior to 6.3.0r26.
Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page.
Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and earlier, when using IKE with pre-shared key authentication, allows remote attackers to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a response if the username is valid but does not respond when the username is invalid.
Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x through 5.x allows remote attackers to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet.
Firewalls from multiple vendors empty state tables more slowly than they are filled, which allows remote attackers to flood state tables with packet flooding attacks such as (1) TCP SYN flood, (2) UDP flood, or (3) Crikey CRC Flood, which causes the firewall to refuse any new connections.
Netscreen running ScreenOS 4.0.0r6 and earlier allows remote attackers to cause a denial of service via a malformed SSH packet to the Secure Command Shell (SCS) management interface, as demonstrated via certain CRC32 exploits, a different vulnerability than CVE-2001-0144.
The web interface (WebUI) of NetScreen ScreenOS before 2.6.1r8, and certain 2.8.x and 3.0.x versions before 3.0.3r1, allows remote attackers to cause a denial of service (crash) via a long user name.
NetScreen ScreenOS before 2.6.1 does not support a maximum number of concurrent sessions for a system, which allows an attacker on the trusted network to cause a denial of service (resource exhaustion) via a port scan to an external network, which consumes all available connections.
NetScreen ScreenOS prior to 2.5r6 on the NetScreen-10 and Netscreen-100 can allow a local attacker to bypass the DMZ 'denial' policy via specific traffic patterns.
Netscreen remote security client
Netscreen remote vpn client
Netscreen-security manager 2004
Session and resource control
Secure access 2000
Odyssey access client
Networks mobility system software
Junos space virtual appliance
Junos space ja1500 appliance
Junos pulse access control service
Junos pulse secure access service
Secure access virtual appliance
Fips secure access 4000
Fips secure access 4500
Fips secure access 6000
Fips secure access 6500
Secure access 2500
Secure access 4000
Secure access 4500
Secure access 6000
Secure access 6500
Secure access 700
Network and security manager software
Junos space ja2500 appliance
Fips infranet controller 6500
Infranet controller 4000
Infranet controller 4500
Infranet controller 6000
Infranet controller 6500
Unified access control software
Juniper installer service client
Junos pulse client
Mobile system software
Pulse connect secure
Trusted platform module firmware
Junos os evolved
Advanced threat protection
Virtual advanced threat protection
Paragon active assurance control center
See all Products for Vendor
Back to Top