Page 11 of 56 results (0.016 seconds)

CVSS: 5.0EPSS: 5%CPEs: 3EXPL: 1

Netscape Enterprise Server with Directory Indexing enabled allows remote attackers to list server directories via web publishing tags such as ?wp-ver-info and ?wp-cs-dump. • https://www.exploit-db.com/exploits/19814 http://www.securityfocus.com/bid/1063 http://www.securityfocus.com/templates/archive.pike?list=1&msg=38D2173D.24E39DD0%40relaygroup.com •

CVSS: 5.0EPSS: 4%CPEs: 3EXPL: 1

Groupwise web server GWWEB.EXE allows remote attackers to read arbitrary files with .htm extensions via a .. (dot dot) attack using the HELP parameter. • https://www.exploit-db.com/exploits/19682 http://marc.info/?l=bugtraq&m=94571433731824&w=2 http://www.osvdb.org/3413 http://www.securityfocus.com/bid/879 •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 1

Default configuration of the search engine in Netscape Enterprise Server 3.5.1, and possibly other versions, allows remote attackers to read the source of JHTML files by specifying a search command using the HTML-tocrec-demo1.pat pattern file. • https://www.exploit-db.com/exploits/19443 http://marc.info/?l=bugtraq&m=93346448121208&w=2 http://marc.info/?l=ntbugtraq&m=93337389603117&w=2 http://www.securityfocus.com/bid/559 •

CVSS: 5.0EPSS: 0%CPEs: 22EXPL: 0

Information from SSL-encrypted sessions via PKCS #1. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 5.0EPSS: 93%CPEs: 6EXPL: 0

Some web servers under Microsoft Windows allow remote attackers to bypass access restrictions for files with long file names. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0012 •