we track for your security since 1999
The Vigil@nce team watches vulnerabilities impacting your computers, and then offers solutions, a database and tools to correct them.
Vulnerabilities of Juniper Instant Virtual Extranet
Juniper Instant Virtual Extranet vulnerability: denial of service via SGC
An attacker can use the handshake restart feature of SGC without the Client Hello message, in order to create a denial of service.
Juniper Instant Virtual Extranet vulnerability: vulnerability of the renegotiation
A remote attacker can use a vulnerability of TLS in order to insert plain text data during a renegotiation via a man-in-the-middle attack.
Juniper Instant Virtual Extranet vulnerability: Bleichenbacher attack on CMS and PKCS7
The Bleichenbacher attack can be used against the OpenSSL implementation of CMS and PKCS#7, in order to obtain clear text information, using 2^20 messages.
Juniper Instant Virtual Extranet vulnerability: several vulnerabilities
Three OpenSSL vulnerabilities can be used by an attacker to create a denial of service or to bypass validations.
Juniper Instant Virtual Extranet vulnerability: six vulnerabilities
An attacker can use several OpenSSL vulnerabilities, in order to obtain information, to create a denial of service, and possibly to execute code.
Display other vulnerabilities of Juniper Instant Virtual Extranet described by Vigil@nce...
Display information about Juniper Instant Virtual Extranet:
. Vigil@nce is a service from
Orange Business Services