Page 4 of 35 results (0.004 seconds)

CVSS: 2.6EPSS: 0%CPEs: 11EXPL: 0

Netscape Communicator before version 4.73 and Navigator 4.07 do not properly validate SSL certificates, which allows remote attackers to steal information by redirecting traffic from a legitimate web server to their own malicious server, aka the "Acros-Suencksen SSL" vulnerability. • http://www.acrossecurity.com/aspr/ASPR-2000-04-06-1-PUB.txt http://www.cert.org/advisories/CA-2000-05.html http://www.redhat.com/support/errata/RHSA-2000-028.html http://www.securityfocus.com/bid/1188 •

CVSS: 3.7EPSS: 0%CPEs: 7EXPL: 1

Netscape 4.73 and earlier follows symlinks when it imports a new certificate, which allows local users to overwrite files of the user importing the certificate. • https://www.exploit-db.com/exploits/19912 http://archives.neohapsis.com/archives/bugtraq/2000-05/0126.html http://www.securityfocus.com/bid/1201 •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 0

A remote attacker can read information from a Netscape user's cache via JavaScript. • http://home.netscape.com/security/notes/jscachebrowsing.html •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Netscape Navigator uses weak encryption for storing a user's Netscape mail password. • http://marc.info/?l=bugtraq&m=94536309217214&w=2 http://marc.info/?l=bugtraq&m=94570673523998&w=2 http://www.rstcorp.com/news/bad-crypto.html •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Netscape Mail Notification (nsnotify) utility in Netscape Communicator uses IMAP without SSL, even if the user has set a preference for Communicator to use an SSL connection, allowing a remote attacker to sniff usernames and passwords in plaintext. • http://marc.info/?l=bugtraq&m=94790377622943&w=2 http://www.iss.net/security_center/static/4385.php •