The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
Vulnerabilities of NetScreen Firewall

NetScreen Firewall vulnerability: predictable random via ssl3_client_hello
An attacker can potentially guess the random used by the TLS client of OpenSSL, in order to read sensitive information.

NetScreen Firewall vulnerability: use after free via d2i_ECPrivateKey
An attacker can force the usage of a freed memory area in d2i_ECPrivateKey of OpenSSL, in order to trigger a denial of service, and possibly to execute code.

NetScreen Firewall vulnerability: clear text session via SKIP-TLS
An attacker, who has a TLS server, can force the JSSE, CyaSSL, Mono or OpenSSL client/server to use a clear text session, in order to allow a third party to capture or alter exchanged data.

NetScreen Firewall vulnerability: NULL pointer dereference via ssl23_get_client_hello
An attacker can force a NULL pointer to be dereferenced in ssl23_get_client_hello() of OpenSSL, in order to trigger a denial of service.

NetScreen Firewall vulnerability: denial of service via IPv6
An attacker can send malicious IPv6 packets to NetScreen Firewall, in order to trigger a denial of service.

Display other vulnerabilities of NetScreen Firewall described by Vigil@nce...

Display information about NetScreen Firewall: