Page 5 of 32 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

Buffer overflow in Netscape Navigator/Communicator 4.7 for Windows 95 and Windows 98 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long argument after the ? character in a URL that references an .asp, .cgi, .html, or .pl file. • http://www.securityfocus.com/archive/1/36306 http://www.securityfocus.com/archive/1/36608 http://www.securityfocus.com/bid/822 https://exchange.xforce.ibmcloud.com/vulnerabilities/7884 •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 0

Netscape Communicator 4.7 and earlier allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long certificate key. • http://www.securiteam.com/exploits/Netscape_4_7_and_earlier_vulnerable_to__Huge_Key__DoS.html https://exchange.xforce.ibmcloud.com/vulnerabilities/3436 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Netscape Communicator 4.04 through 4.7 (and possibly other versions) in various UNIX operating systems converts the 0x8b character to a "<" sign, and the 0x9b character to a ">" sign, which could allow remote attackers to attack other clients via cross-site scripting (CSS) in CGI programs that do not filter these characters. • http://marc.info/?l=bugtraq&m=93915331626185&w=2 •

CVSS: 5.1EPSS: 0%CPEs: 5EXPL: 1

Buffer overflow in Netscape Communicator via EMBED tags in the pluginspage option. • https://www.exploit-db.com/exploits/19486 http://www.securityfocus.com/bid/618 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Netscape Communicator 4.x with Javascript enabled does not warn a user of cookie settings, even if they have selected the option to "Only accept cookies originating from the same server as the page being viewed". • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0809 •