Page 2 of 9 results (0.006 seconds)

CVSS: 5.0EPSS: 4%CPEs: 36EXPL: 2

The POP3 mail client in Mozilla 1.0 and earlier, and Netscape Communicator 4.7 and earlier, allows remote attackers to cause a denial of service (no new mail) via a mail message containing a dot (.) at a newline, which is interpreted as the end of the message. • https://www.exploit-db.com/exploits/21539 http://bugzilla.mozilla.org/show_bug.cgi?id=144228 http://mozilla.org/releases/mozilla1.0.1/security-fixes-1.0.1.html http://online.securityfocus.com/archive/1/276628 http://www.iss.net/security_center/static/9343.php http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:074 http://www.securityfocus.com/archive/1/276946 http://www.securityfocus.com/bid/5002 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in the HTML parser for Netscape 4.75 and earlier allows remote attackers to execute arbitrary commands via a long password value in a form field. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:66.netscape.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000344 http://lists.suse.com/archives/suse-security-announce/2000-Nov/0005.html http://marc.info/?l=bugtraq&m=97500270012529&w=2 http://www.osvdb.org/7207 http://www.redhat.com/support/errata/RHSA-2000-109.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5542 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

Buffer overflow in Netscape Navigator/Communicator 4.7 for Windows 95 and Windows 98 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long argument after the ? character in a URL that references an .asp, .cgi, .html, or .pl file. • http://www.securityfocus.com/archive/1/36306 http://www.securityfocus.com/archive/1/36608 http://www.securityfocus.com/bid/822 https://exchange.xforce.ibmcloud.com/vulnerabilities/7884 •

CVSS: 7.5EPSS: 5%CPEs: 13EXPL: 0

The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages. • http://java.sun.com/pr/1999/03/pr990329-01.html http://marc.info/?l=bugtraq&m=92333596624452&w=2 http://www.securityfocus.com/bid/1939 •