Page 4 of 20 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Netscape Communicator 4.04 through 4.7 (and possibly other versions) in various UNIX operating systems converts the 0x8b character to a "<" sign, and the 0x9b character to a ">" sign, which could allow remote attackers to attack other clients via cross-site scripting (CSS) in CGI programs that do not filter these characters. • http://marc.info/?l=bugtraq&m=93915331626185&w=2 •

CVSS: 5.1EPSS: 0%CPEs: 5EXPL: 1

Buffer overflow in Netscape Communicator via EMBED tags in the pluginspage option. • https://www.exploit-db.com/exploits/19486 http://www.securityfocus.com/bid/618 •

CVSS: 2.6EPSS: 0%CPEs: 3EXPL: 0

When Javascript is embedded within the TITLE tag, Netscape Communicator allows a remote attacker to use the "about" protocol to gain access to browser information. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0762 •

CVSS: 5.1EPSS: 0%CPEs: 5EXPL: 0

Java in Netscape 4.5 does not properly restrict applets from connecting to other hosts besides the one from which the applet was loaded, which violates the Java security model and could allow remote attackers to conduct unauthorized activities. • http://www.securityfocus.com/archive/1/12231 https://exchange.xforce.ibmcloud.com/vulnerabilities/1727 •

CVSS: 6.4EPSS: 3%CPEs: 7EXPL: 1

The view-source CGI program allows remote attackers to read arbitrary files via a .. (dot dot) attack. • https://www.exploit-db.com/exploits/20568 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0174 •