8 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

26 Mar 2001 — The caching module in Netscape Fasttrack Server 4.1 allows remote attackers to cause a denial of service (resource exhaustion) by requesting a large number of non-existent URLs. • http://marc.info/?l=bugtraq&m=98021351718874&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

12 Mar 2001 — Netscape Enterprise 3.5.1 and FastTrack 3.01 servers allow a remote attacker to view source code to scripts by appending a %20 to the script's URL. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0758 •

CVSS: 10.0EPSS: 0%CPEs: 6EXPL: 0

12 Mar 2001 — Insecure file permissions for Netscape FastTrack Server 2.x, Enterprise Server 2.0, and Proxy Server 2.5 in SCO UnixWare 7.0.x and 2.1.3 allow an attacker to gain root privileges. • ftp://ftp.sco.com/SSE/security_bulletins/SB-99.08a •

CVSS: 9.8EPSS: 4%CPEs: 2EXPL: 3

04 Jan 2000 — Buffer overflow in Netscape Enterprise Server and FastTrask Server allows remote attackers to gain privileges via a long HTTP GET request. • https://www.exploit-db.com/exploits/263 •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

01 Dec 1999 — Buffer overflow in Netscape Enterprise Server and Netscape FastTrack Server allows remote attackers to gain privileges via the HTTP Basic Authentication procedure. • http://www.securityfocus.com/bid/847 •

CVSS: 7.5EPSS: 5%CPEs: 22EXPL: 0

26 Jun 1998 — Information from SSL-encrypted sessions via PKCS #1. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 9.1EPSS: 1%CPEs: 6EXPL: 0

06 Feb 1998 — Some web servers under Microsoft Windows allow remote attackers to bypass access restrictions for files with long file names. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0012 •

CVSS: 7.5EPSS: 4%CPEs: 1EXPL: 1

01 Jan 1998 — Netscape FastTrack Web server lists files when a lowercase "get" command is used instead of an uppercase GET. • https://www.exploit-db.com/exploits/19363 • CWE-178: Improper Handling of Case Sensitivity •