Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
netscreen screenos 3.0 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2002-2234
NetScreen ScreenOS prior to 4.0.1 allows remote malicious users to bypass the Malicious-URL blocking feature by splitting the URL into fragmented IP requests.
Netscreen Screenos 2.7.1
Netscreen Screenos 2.8
Netscreen Screenos 3.0
Netscreen Screenos 3.1
Netscreen Screenos 4.0
5
CVSSv2
CVE-2002-2266
NetScreen ScreenOS 2.8 up to and including 4.0, when forwarding H.323 or Netmeeting traffic, allows remote malicious users to cause a denial of service (firewall session table consumption) by establishing multiple half-open H.323 sessions, which are not cleaned up on garbage remo...
Netscreen Screenos 2.8
Netscreen Screenos 3.0
Netscreen Screenos 3.1
Netscreen Screenos 4.0
5
CVSSv2
CVE-2002-0891
The web interface (WebUI) of NetScreen ScreenOS prior to 2.6.1r8, and certain 2.8.x and 3.0.x versions prior to 3.0.3r1, allows remote malicious users to cause a denial of service (crash) via a long user name.
Juniper Netscreen Screenos 2.5r1
Juniper Netscreen Screenos 2.5r6
Juniper Netscreen Screenos 2.7.1
Juniper Netscreen Screenos 2.7.1r2
Juniper Netscreen Screenos 3.0.0r4
Juniper Netscreen Screenos 2.6.1r1
Juniper Netscreen Screenos 2.6.1r2
Juniper Netscreen Screenos 2.6.1r3
Juniper Netscreen Screenos 2.6.1r4
Juniper Netscreen Screenos 2.6.1r5
Juniper Netscreen Screenos 2.10 R3
Juniper Netscreen Screenos 2.10 R4
Juniper Netscreen Screenos 2.5
Juniper Netscreen Screenos 2.8 R1
Juniper Netscreen Screenos 3.0.0
Juniper Netscreen Screenos 3.0.0r1
Juniper Netscreen Screenos 3.0.0r2
Juniper Netscreen Screenos 2.5r2
Juniper Netscreen Screenos 2.6.1
Juniper Netscreen Screenos 2.7.1r1
Juniper Netscreen Screenos 2.7.1r3
Juniper Netscreen Screenos 3.0.0r3
5
CVSSv2
CVE-2005-2640
Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and previous versions, when using IKE with pre-shared key authentication, allows remote malicious users to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a respon...
Neoteris Instant Virtual Extranet 3.2
Neoteris Instant Virtual Extranet 3.3
Neoteris Instant Virtual Extranet 3.0
Neoteris Instant Virtual Extranet 3.1
Neoteris Instant Virtual Extranet 3.3.1
Juniper Netscreen Screenos 1.64
Juniper Netscreen Screenos 1.66
Juniper Netscreen Screenos 2.1 R6
Juniper Netscreen Screenos 2.1 R7
Juniper Netscreen Screenos 2.6.1
Juniper Netscreen Screenos 2.6.1r1
Juniper Netscreen Screenos 2.6.1r5
Juniper Netscreen Screenos 2.6.1r6
Juniper Netscreen Screenos 2.7.1r3
Juniper Netscreen Screenos 2.8
Juniper Netscreen Screenos 3.0.1r1
Juniper Netscreen Screenos 3.0.1r2
Juniper Netscreen Screenos 3.0.3
Juniper Netscreen Screenos 3.0.3 R1.1
Juniper Netscreen Screenos 3.0.3r7
Juniper Netscreen Screenos 3.0.3r8
Juniper Netscreen Screenos 3.1.0r4
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started