The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of NetScreen IVE

Junos Pulse SA, UAC: usage of weak SSL Cipher
An attacker can use a Man-in-the-Middle on Junos Pulse SA or UAC, in order to capture sessions...
CERTFR-2014-AVI-271, CVE-2014-3812, JSA10628, VIGILANCE-VUL-14891
OpenSSL: information disclosure via Heartbeat
An attacker can use the Heartbeat protocol on an application compiled with OpenSSL, in order to obtain sensitive information, such as keys stored in memory...
1669839, 190438, 2076225, 2962393, c04236102, c04267775, c04286049, CA20140413-01, CERTFR-2014-ALE-003, CERTFR-2014-AVI-156, CERTFR-2014-AVI-161, CERTFR-2014-AVI-162, CERTFR-2014-AVI-167, CERTFR-2014-AVI-169, CERTFR-2014-AVI-177, CERTFR-2014-AVI-178, CERTFR-2014-AVI-179, CERTFR-2014-AVI-180, CERTFR-2014-AVI-181, CERTFR-2014-AVI-198, CERTFR-2014-AVI-199, CERTFR-2014-AVI-213, cisco-sa-20140409-heartbleed, CTX140605, CVE-2014-0160, CVE-2014-0346-REJECT, DSA-2896-1, DSA-2896-2, emr_na-c04236102-7, ESA-2014-034, ESA-2014-036, ESA-2014-075, FEDORA-2014-4879, FEDORA-2014-4910, FEDORA-2014-4982, FEDORA-2014-4999, FG-IR-14-011, FreeBSD-SA-14:06.openssl, Heartbleed, HPSBMU02995, HPSBMU03025, HPSBMU03040, ICSA-14-105-03, JSA10623, MDVSA-2014:123, MDVSA-2015:062, NetBSD-SA2014-004, openSUSE-SU-2014:0492-1, openSUSE-SU-2014:0560-1, openSUSE-SU-2014:0719-1, pfSense-SA-14_04.openssl, RHSA-2014:0376-01, RHSA-2014:0377-01, RHSA-2014:0378-01, RHSA-2014:0396-01, RHSA-2014:0416-01, SA40005, SA79, SB10071, SOL15159, SPL-82696, SSA:2014-098-01, SSA-635659, SSRT101565, USN-2165-1, VIGILANCE-VUL-14534, VMSA-2014-0004, VMSA-2014-0004.1, VMSA-2014-0004.2, VMSA-2014-0004.3, VMSA-2014-0004.6, VMSA-2014-0004.7, VU#720951
Junos Pulse Secure Access Service: Cross Site Scripting of Pulse Collaboration
An attacker can trigger a Cross Site Scripting in Pulse Collaboration of Junos Pulse Secure Access Service, in order to execute JavaScript code in the context of the web site...
CERTFR-2014-AVI-123, CVE-2014-2291, JSA10617, VIGILANCE-VUL-14414
Junos Pulse Secure Access Service: privilege escalation via Linux Network Connect
A local attacker can use Linux Network Connect of Junos Pulse Secure Access Service, in order to escalate his privileges...
CERTFR-2014-AVI-123, CVE-2014-2292, JSA10616, VIGILANCE-VUL-14413
Juniper Junos Pulse Secure Access Service, IVE: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Juniper Junos Pulse Secure Access Service, IVE, in order to execute JavaScript code in the context of the web site...
BID-64261, CERTA-2013-AVI-674, CVE-2013-6956, JSA10602, VIGILANCE-VUL-13941
Juniper Junos Pulse SA, IVE, UAC: multiple vulnerabilities of OpenSSL
An attacker can use several vulnerabilities of OpenSSL of Junos Pulse Secure Access Service (IVE) and Junos Pulse Access Control Service (UAC)...
CERTA-2013-AVI-527, CVE-2012-2131, CVE-2013-0166, CVE-2013-0169, JSA10591, VIGILANCE-VUL-13417
Juniper Junos Pulse SA, IVE, UAC: denial of service via SSL Acceleration Card
When a SSL Acceleration Card is installed on Junos Pulse Secure Access Service (IVE) and Junos Pulse Access Control Service (UAC), an attacker can send a malformed packet, in order to trigger a denial of service...
BID-62354, CERTA-2013-AVI-527, CVE-2013-5650, JSA10590, VIGILANCE-VUL-13416
Juniper Junos Pulse SA, IVE: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Juniper Junos Pulse Secure Access, in order to execute JavaScript code in the context of the web site...
BID-62353, CERTA-2013-AVI-527, CVE-2013-5649, JSA10589, VIGILANCE-VUL-13415
Juniper SA, UAC: site spoofing via Trusted Server CA Root
An attacker, who has access to the development certification authority of Juniper, can create a fake site, which is not detected by Junos Pulse Secure Access Service (SSL VPN) nor Junos Pulse Access Control Service (UAC)...
BID-60521, CVE-2013-3970, JSA10571, VIGILANCE-VUL-12979
OpenSSL: memory corruption via asn1_d2i_read_bio
An attacker can use malformed ASN.1 data, with an application linked to OpenSSL, in order to corrupt the memory, which leads to a denial of service or to code execution...
1643316, BID-53158, c03333987, CERTA-2012-AVI-224, CERTA-2012-AVI-286, CERTA-2012-AVI-419, CERTA-2012-AVI-479, CERTFR-2014-AVI-480, CERTFR-2016-AVI-300, CVE-2012-2110, DSA-2454-1, ESX350-201302401-SG, ESX400-201209001, ESX400-201209401-SG, ESX400-201209402-SG, ESX400-201209404-SG, ESX410-201208101-SG, ESX410-201208102-SG, ESX410-201208103-SG, ESX410-201208104-SG, ESX410-201208105-SG, ESX410-201208106-SG, ESX410-201208107-SG, FEDORA-2012-6395, FEDORA-2012-6403, FreeBSD-SA-12:01.openssl, HPSBUX02782, JSA10659, KB27376, MDVSA-2012:060, NetBSD-SA2012-001, openSUSE-SU-2013:0336-1, openSUSE-SU-2013:0337-1, openSUSE-SU-2013:0339-1, PSN-2012-09-712, PSN-2013-03-872, PSN-2013-05-941, RHSA-2012:0518-01, RHSA-2012:0522-01, RHSA-2012:1306-01, RHSA-2012:1307-01, RHSA-2012:1308-01, SOL16285, SSRT100844, SUSE-SU-2012:0623-1, SUSE-SU-2012:0637-1, SUSE-SU-2012:1149-1, SUSE-SU-2012:1149-2, VIGILANCE-VUL-11559, VMSA-2012-0003.1, VMSA-2012-0005.2, VMSA-2012-0005.3, VMSA-2012-0008.1, VMSA-2012-0013, VMSA-2012-0013.1, VMSA-2013-0001.2, VMSA-2013-0003
Our database contains other pages. You can request a free trial to read them.

Display information about NetScreen IVE: