Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
screenos vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2015-7750
The L2TP packet processing functionality in Juniper Netscreen and ScreenOS Firewall products with ScreenOS prior to 6.3.0r13-dnd1, 6.3.0r14 up to and including 6.3.0r18 prior to 6.3.0r18-dnc1, and 6.3.0r19 allows remote malicious users to cause a denial of service via a crafted L...
Juniper Screenos
Juniper Screenos 6.3.0
5
CVSSv2
CVE-2005-2640
Behavioral discrepancy information leak in Juniper Netscreen VPN running ScreenOS 5.2.0 and previous versions, when using IKE with pre-shared key authentication, allows remote malicious users to enumerate valid usernames via an IKE Aggressive Mode packet, which generates a respon...
Neoteris Instant Virtual Extranet 3.2
Neoteris Instant Virtual Extranet 3.3
Neoteris Instant Virtual Extranet 3.0
Neoteris Instant Virtual Extranet 3.1
Neoteris Instant Virtual Extranet 3.3.1
Juniper Netscreen Screenos 1.64
Juniper Netscreen Screenos 1.66
Juniper Netscreen Screenos 2.1 R6
Juniper Netscreen Screenos 2.1 R7
Juniper Netscreen Screenos 2.6.1
Juniper Netscreen Screenos 2.6.1r1
Juniper Netscreen Screenos 2.6.1r5
Juniper Netscreen Screenos 2.6.1r6
Juniper Netscreen Screenos 2.7.1r3
Juniper Netscreen Screenos 2.8
Juniper Netscreen Screenos 3.0.1r1
Juniper Netscreen Screenos 3.0.1r2
Juniper Netscreen Screenos 3.0.3
Juniper Netscreen Screenos 3.0.3 R1.1
Juniper Netscreen Screenos 3.0.3r7
Juniper Netscreen Screenos 3.0.3r8
Juniper Netscreen Screenos 3.1.0r4
1 EDB exploit
5
CVSSv2
CVE-2004-1446
Unknown vulnerability in ScreenOS in Juniper Networks NetScreen firewall 3.x up to and including 5.x allows remote malicious users to cause a denial of service (device reboot or hang) via a crafted SSH v1 packet.
Juniper Netscreen Screenos 1.64
Juniper Netscreen Screenos 1.7
Juniper Netscreen Screenos 1.73 R1
Juniper Netscreen Screenos 2.5
Juniper Netscreen Screenos 2.5r1
Juniper Netscreen Screenos 2.6.1r11
Juniper Netscreen Screenos 2.6.1r12
Juniper Netscreen Screenos 2.6.1r8
Juniper Netscreen Screenos 2.6.1r9
Juniper Netscreen Screenos 3.0.0r1
Juniper Netscreen Screenos 3.0.0r2
Juniper Netscreen Screenos 3.0.1r4
Juniper Netscreen Screenos 3.0.1r5
Juniper Netscreen Screenos 3.0.3r2
Juniper Netscreen Screenos 3.0.3r3
Juniper Netscreen Screenos 3.1.0r10
Juniper Netscreen Screenos 3.1.0r11
Juniper Netscreen Screenos 3.1.0r7
Juniper Netscreen Screenos 3.1.0r8
Juniper Netscreen Screenos 4.0.0r11
Juniper Netscreen Screenos 4.0.0r12
Juniper Netscreen Screenos 4.0.0r9
5
CVSSv2
CVE-2004-1766
The default installation of NetScreen-Security Manager before Feature Pack 1 does not enable encryption for communication with devices running ScreenOS 5.0, which allows remote malicious users to obtain sensitive information via sniffing.
5
CVSSv2
CVE-2002-1547
Netscreen running ScreenOS 4.0.0r6 and previous versions allows remote malicious users to cause a denial of service via a malformed SSH packet to the Secure Command Shell (SCS) management interface, as demonstrated via certain CRC32 exploits, a different vulnerability than CVE-20...
Juniper Netscreen Screenos
5
CVSSv2
CVE-2002-2150
Firewalls from multiple vendors empty state tables more slowly than they are filled, which allows remote malicious users to flood state tables with packet flooding attacks such as (1) TCP SYN flood, (2) UDP flood, or (3) Crikey CRC Flood, which causes the firewall to refuse any n...
Juniper Netscreen Screenos 2.10 R3
Juniper Netscreen Screenos 2.10 R4
Juniper Netscreen Screenos 2.7.1
Juniper Netscreen Screenos 2.7.1r1
Juniper Netscreen Screenos 3.0.3 R1.1
Juniper Netscreen Screenos 2.7.1r2
Juniper Netscreen Screenos 3.0.1r1
Juniper Netscreen Screenos 2.7.1r3
Juniper Netscreen Screenos 3.0.1r2
5
CVSSv2
CVE-2002-2266
NetScreen ScreenOS 2.8 up to and including 4.0, when forwarding H.323 or Netmeeting traffic, allows remote malicious users to cause a denial of service (firewall session table consumption) by establishing multiple half-open H.323 sessions, which are not cleaned up on garbage remo...
Netscreen Screenos 2.8
Netscreen Screenos 3.0
Netscreen Screenos 3.1
Netscreen Screenos 4.0
5
CVSSv2
CVE-2002-0891
The web interface (WebUI) of NetScreen ScreenOS prior to 2.6.1r8, and certain 2.8.x and 3.0.x versions prior to 3.0.3r1, allows remote malicious users to cause a denial of service (crash) via a long user name.
Juniper Netscreen Screenos 2.5r1
Juniper Netscreen Screenos 2.5r6
Juniper Netscreen Screenos 2.7.1
Juniper Netscreen Screenos 2.7.1r2
Juniper Netscreen Screenos 3.0.0r4
Juniper Netscreen Screenos 2.6.1r1
Juniper Netscreen Screenos 2.6.1r2
Juniper Netscreen Screenos 2.6.1r3
Juniper Netscreen Screenos 2.6.1r4
Juniper Netscreen Screenos 2.6.1r5
Juniper Netscreen Screenos 2.10 R3
Juniper Netscreen Screenos 2.10 R4
Juniper Netscreen Screenos 2.5
Juniper Netscreen Screenos 2.8 R1
Juniper Netscreen Screenos 3.0.0
Juniper Netscreen Screenos 3.0.0r1
Juniper Netscreen Screenos 3.0.0r2
Juniper Netscreen Screenos 2.5r2
Juniper Netscreen Screenos 2.6.1
Juniper Netscreen Screenos 2.7.1r1
Juniper Netscreen Screenos 2.7.1r3
Juniper Netscreen Screenos 3.0.0r3
5
CVSSv2
CVE-2001-0007
Buffer overflow in NetScreen Firewall WebUI allows remote malicious users to cause a denial of service via a long URL request to the web administration interface.
Netscreen Screen Os 1.73r
Netscreen Screen Os 2.10r3
Netscreen Screen Os 2.1r6
Netscreen Screen Os 2.5r1
1 EDB exploit
4.3
CVSSv2
CVE-2018-0018
On SRX Series devices during compilation of IDP policies, an attacker sending specially crafted packets may be able to bypass firewall rules, leading to information disclosure which an attacker may use to gain control of the target device or other internal devices, systems or ser...
Juniper Junos 12.1x46
Juniper Junos 12.3x48
Juniper Junos 15.1x49
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »