Page 2 of 11 results (0.004 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Netscape 4 sends Referer headers containing https:// URLs in requests for http:// URLs, which allows remote attackers to obtain potentially sensitive information by reading Referer log data. • http://securityreason.com/securityalert/4004 http://www.securityfocus.com/archive/1/348574 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in the HTML parser for Netscape 4.75 and earlier allows remote attackers to execute arbitrary commands via a long password value in a form field. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:66.netscape.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000344 http://lists.suse.com/archives/suse-security-announce/2000-Nov/0005.html http://marc.info/?l=bugtraq&m=97500270012529&w=2 http://www.osvdb.org/7207 http://www.redhat.com/support/errata/RHSA-2000-109.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5542 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

Buffer overflow in Netscape Navigator/Communicator 4.7 for Windows 95 and Windows 98 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long argument after the ? character in a URL that references an .asp, .cgi, .html, or .pl file. • http://www.securityfocus.com/archive/1/36306 http://www.securityfocus.com/archive/1/36608 http://www.securityfocus.com/bid/822 https://exchange.xforce.ibmcloud.com/vulnerabilities/7884 •

CVSS: 2.6EPSS: 0%CPEs: 11EXPL: 0

By default, Internet Explorer 5.0 and other versions enables the "Navigate sub-frames across different domains" option, which allows frame spoofing. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0827 •

CVSS: 7.5EPSS: 5%CPEs: 13EXPL: 0

The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages. • http://java.sun.com/pr/1999/03/pr990329-01.html http://marc.info/?l=bugtraq&m=92333596624452&w=2 http://www.securityfocus.com/bid/1939 •