Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page.
| Version | Base score | Base severity | Vector |
|---|
| Hyperlink | Resource Type |
|---|
Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.securityfocus.com/bid/31528 | vdb-entry x_refsource_BID |
| http://www.vupen.com/english/advisories/2008/2713 | vdb-entry x_refsource_VUPEN |
| http://secunia.com/advisories/32078 | third-party-advisory x_refsource_SECUNIA |
| http://www.layereddefense.com/netscreen01oct.html | x_refsource_MISC |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.securityfocus.com/bid/31528 | vdb-entry x_refsource_BID x_transferred |
| http://www.vupen.com/english/advisories/2008/2713 | vdb-entry x_refsource_VUPEN x_transferred |
| http://secunia.com/advisories/32078 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.layereddefense.com/netscreen01oct.html | x_refsource_MISC x_transferred |
Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 4.3 | MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
| Hyperlink | Source | Resource |
|---|---|---|
| http://secunia.com/advisories/32078 | cve@mitre.org | Vendor Advisory |
| http://www.layereddefense.com/netscreen01oct.html | cve@mitre.org | N/A |
| http://www.securityfocus.com/bid/31528 | cve@mitre.org | N/A |
| http://www.vupen.com/english/advisories/2008/2713 | cve@mitre.org | N/A |
| http://secunia.com/advisories/32078 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
| http://www.layereddefense.com/netscreen01oct.html | af854a3a-2127-422b-91ae-364da2661108 | N/A |
| http://www.securityfocus.com/bid/31528 | af854a3a-2127-422b-91ae-364da2661108 | N/A |
| http://www.vupen.com/english/advisories/2008/2713 | af854a3a-2127-422b-91ae-364da2661108 | N/A |