CVE-2000-0517
https://notcve.org/view.php?id=CVE-2000-0517
Netscape 4.73 and earlier does not properly warn users about a potentially invalid certificate if the user has previously accepted the certificate for a different web site, which could allow remote attackers to spoof a legitimate web site by compromising that site's DNS information. • http://www.cert.org/advisories/CA-2000-08.html http://www.securityfocus.com/bid/1260 https://exchange.xforce.ibmcloud.com/vulnerabilities/4550 •
CVE-2000-0406
https://notcve.org/view.php?id=CVE-2000-0406
Netscape Communicator before version 4.73 and Navigator 4.07 do not properly validate SSL certificates, which allows remote attackers to steal information by redirecting traffic from a legitimate web server to their own malicious server, aka the "Acros-Suencksen SSL" vulnerability. • http://www.acrossecurity.com/aspr/ASPR-2000-04-06-1-PUB.txt http://www.cert.org/advisories/CA-2000-05.html http://www.redhat.com/support/errata/RHSA-2000-028.html http://www.securityfocus.com/bid/1188 •
CVE-2000-0409 – Netscape Communicator 4.5/4.51/4.6/4.61/4.7/4.72/4.73 - '/tmp' Symlink
https://notcve.org/view.php?id=CVE-2000-0409
Netscape 4.73 and earlier follows symlinks when it imports a new certificate, which allows local users to overwrite files of the user importing the certificate. • https://www.exploit-db.com/exploits/19912 http://archives.neohapsis.com/archives/bugtraq/2000-05/0126.html http://www.securityfocus.com/bid/1201 •
CVE-1999-0790
https://notcve.org/view.php?id=CVE-1999-0790
A remote attacker can read information from a Netscape user's cache via JavaScript. • http://home.netscape.com/security/notes/jscachebrowsing.html •
CVE-2000-0236 – Netscape Enterprise Server 3.0/3.6/3.51 - Directory Indexing
https://notcve.org/view.php?id=CVE-2000-0236
Netscape Enterprise Server with Directory Indexing enabled allows remote attackers to list server directories via web publishing tags such as ?wp-ver-info and ?wp-cs-dump. • https://www.exploit-db.com/exploits/19814 http://www.securityfocus.com/bid/1063 http://www.securityfocus.com/templates/archive.pike?list=1&msg=38D2173D.24E39DD0%40relaygroup.com •