First published: Mon Feb 09 2009(Updated: )
Cross-site scripting (XSS) vulnerability in Juniper NetScreen ScreenOS before 5.4r10, 6.0r6, and 6.1r2 allows remote attackers to inject arbitrary web script or HTML via the user name parameter to the (1) web interface login page or the (2) telnet login page.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juniper ScreenOS | =1.6.0 | |
Juniper ScreenOS | <=5.4.0r9.0 | |
Juniper ScreenOS | =2.0.0 | |
Juniper ScreenOS | =2.5.0 | |
Juniper ScreenOS | =2.6.0 | |
Juniper ScreenOS | =2.6.1 | |
Juniper ScreenOS | =2.6.1r1 | |
Juniper ScreenOS | =2.6.1r2 | |
Juniper ScreenOS | =2.6.1r3 | |
Juniper ScreenOS | =2.6.1r4 | |
Juniper ScreenOS | =2.6.1r5 | |
Juniper ScreenOS | =2.6.1r6 | |
Juniper ScreenOS | =2.6.1r7 | |
Juniper ScreenOS | =2.6.1r8 | |
Juniper ScreenOS | =2.6.1r9 | |
Juniper ScreenOS | =2.6.1r10 | |
Juniper ScreenOS | =2.6.1r11 | |
Juniper ScreenOS | =2.6.1r12 | |
Juniper ScreenOS | =2.7.0 | |
Juniper ScreenOS | =2.7.1 | |
Juniper ScreenOS | =2.7.1r1 | |
Juniper ScreenOS | =2.7.1r2 | |
Juniper ScreenOS | =2.7.1r3 | |
Juniper ScreenOS | =3.0.0 | |
Juniper ScreenOS | =3.0.0r1 | |
Juniper ScreenOS | =3.0.0r2 | |
Juniper ScreenOS | =3.0.0r3 | |
Juniper ScreenOS | =3.0.0r4 | |
Juniper ScreenOS | =3.0.1 | |
Juniper ScreenOS | =3.0.1r1 | |
Juniper ScreenOS | =3.0.1r2 | |
Juniper ScreenOS | =3.0.1r3 | |
Juniper ScreenOS | =3.0.1r4 | |
Juniper ScreenOS | =3.0.1r5 | |
Juniper ScreenOS | =3.0.1r6 | |
Juniper ScreenOS | =3.0.1r7 | |
Juniper ScreenOS | =3.0.2 | |
Juniper ScreenOS | =3.0.3 | |
Juniper ScreenOS | =3.0.3r1 | |
Juniper ScreenOS | =3.0.3r1.1 | |
Juniper ScreenOS | =3.0.3r2 | |
Juniper ScreenOS | =3.0.3r3 | |
Juniper ScreenOS | =3.0.3r4 | |
Juniper ScreenOS | =3.0.3r5 | |
Juniper ScreenOS | =3.0.3r6 | |
Juniper ScreenOS | =3.0.3r7 | |
Juniper ScreenOS | =3.0.3r8 | |
Juniper ScreenOS | =3.1.0 | |
Juniper ScreenOS | =3.1.0r1 | |
Juniper ScreenOS | =3.1.0r2 | |
Juniper ScreenOS | =3.1.0r3 | |
Juniper ScreenOS | =3.1.0r4 | |
Juniper ScreenOS | =3.1.0r5 | |
Juniper ScreenOS | =3.1.0r6 | |
Juniper ScreenOS | =3.1.0r7 | |
Juniper ScreenOS | =3.1.0r8 | |
Juniper ScreenOS | =3.1.0r9 | |
Juniper ScreenOS | =3.1.0r10 | |
Juniper ScreenOS | =3.1.0r11 | |
Juniper ScreenOS | =3.1.0r12 | |
Juniper ScreenOS | =4.0.0 | |
Juniper ScreenOS | =4.0.0 | |
Juniper ScreenOS | =4.0.0 | |
Juniper ScreenOS | =4.0.0r1 | |
Juniper ScreenOS | =4.0.0r2 | |
Juniper ScreenOS | =4.0.0r3 | |
Juniper ScreenOS | =4.0.0r4 | |
Juniper ScreenOS | =4.0.0r5 | |
Juniper ScreenOS | =4.0.0r6 | |
Juniper ScreenOS | =4.0.0r7 | |
Juniper ScreenOS | =4.0.0r8 | |
Juniper ScreenOS | =4.0.0r9 | |
Juniper ScreenOS | =4.0.0r10 | |
Juniper ScreenOS | =4.0.0r11 | |
Juniper ScreenOS | =4.0.0r12 | |
Juniper ScreenOS | =4.0.1 | |
Juniper ScreenOS | =4.0.1r1 | |
Juniper ScreenOS | =4.0.1r2 | |
Juniper ScreenOS | =4.0.1r3 | |
Juniper ScreenOS | =4.0.1r4 | |
Juniper ScreenOS | =4.0.1r5 | |
Juniper ScreenOS | =4.0.1r6 | |
Juniper ScreenOS | =4.0.1r7 | |
Juniper ScreenOS | =4.0.1r8 | |
Juniper ScreenOS | =4.0.1r9 | |
Juniper ScreenOS | =4.0.1r10 | |
Juniper ScreenOS | =4.0.2 | |
Juniper ScreenOS | =4.0.3 | |
Juniper ScreenOS | =4.0.3r1 | |
Juniper ScreenOS | =4.0.3r2 | |
Juniper ScreenOS | =4.0.3r3 | |
Juniper ScreenOS | =4.0.3r4 | |
Juniper ScreenOS | =4.0.3r5 | |
Juniper ScreenOS | =4.0.3r6 | |
Juniper ScreenOS | =4.0.3r7 | |
Juniper ScreenOS | =4.0.3r8 | |
Juniper ScreenOS | =4.0.3r9 | |
Juniper ScreenOS | =5.0.0 | |
Juniper ScreenOS | =5.0.0r1 | |
Juniper ScreenOS | =5.0.0r2 | |
Juniper ScreenOS | =5.0.0r3 | |
Juniper ScreenOS | =5.0.0r4 | |
Juniper ScreenOS | =5.0.0r5 | |
Juniper ScreenOS | =5.0.0r6 | |
Juniper ScreenOS | =5.0.0r7 | |
Juniper ScreenOS | =5.0.0r8 | |
Juniper ScreenOS | =5.0.0r9 | |
Juniper ScreenOS | =5.0.0r10 | |
Juniper ScreenOS | =5.0.0r11 | |
Juniper ScreenOS | =5.1.0 | |
Juniper ScreenOS | =5.1.0r1 | |
Juniper ScreenOS | =5.1.0r2 | |
Juniper ScreenOS | =5.1.0r3 | |
Juniper ScreenOS | =5.1.0r4 | |
Juniper ScreenOS | =5.2.0 | |
Juniper ScreenOS | =5.2.0r1 | |
Juniper ScreenOS | =5.2.0r2 | |
Juniper ScreenOS | =5.2.0r3 | |
Juniper ScreenOS | =5.3.0 | |
Juniper ScreenOS | =5.3.0r1 | |
Juniper ScreenOS | =5.3.0r2 | |
Juniper ScreenOS | =5.3.0r3 | |
Juniper ScreenOS | =5.3.0r4 | |
Juniper ScreenOS | =5.3.0r5 | |
Juniper ScreenOS | =5.3.0r6 | |
Juniper ScreenOS | =5.3.0r7 | |
Juniper ScreenOS | =5.3.0r8 | |
Juniper ScreenOS | =5.3.0r9 | |
Juniper ScreenOS | =5.3.0r10 | |
Juniper ScreenOS | =5.4.0 | |
Juniper ScreenOS | =5.4.0r1 | |
Juniper ScreenOS | =5.4.0r2 | |
Juniper ScreenOS | =5.4.0r3 | |
Juniper ScreenOS | =5.4.0r4 | |
Juniper ScreenOS | =5.4.0r5 | |
Juniper ScreenOS | =5.4.0r6 | |
Juniper ScreenOS | =5.4.0r7 | |
Juniper ScreenOS | =5.4.0r8 | |
Juniper ScreenOS | =5.4.0r8a | |
Juniper ScreenOS | =6.0.0r6 | |
Juniper ScreenOS | =6.1.0r2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6096 has a medium severity rating due to its potential for cross-site scripting attacks allowing unauthorized script injection.
To mitigate CVE-2008-6096, upgrade to Juniper NetScreen ScreenOS version 5.4r10, 6.0r6, or 6.1r2 or later.
CVE-2008-6096 affects multiple versions of Juniper NetScreen ScreenOS prior to 5.4r10 across various releases.
CVE-2008-6096 allows remote attackers to execute malicious scripts in the context of user sessions, potentially compromising sensitive information.
CVE-2008-6096 is a cross-site scripting (XSS) vulnerability that allows for the injection of arbitrary web scripts or HTML via user input.