Page 7 of 120 results (0.006 seconds)

CVSS: 7.5EPSS: 43%CPEs: 1EXPL: 0

Buffer overflow in the Client Detection Tool (CDT) plugin (npcdt.dll) for Netscape 7.02 allows remote attackers to execute arbitrary code via an attachment with a long filename. Desbordamiento de búfer en el plugin de la Herramienta de Detección de cliente (CDT) (npcdt.dll) de Netscape 7.02 permite a atacantes remotos ejecutar código arbitrario mediante un adjunto con un nombre de fichero largo. • http://jimmers.russia.webmatrixhosting.net/whitepapers/CDTbug.pdf http://marc.info/?l=bugtraq&m=105820193406838&w=2 •

CVSS: 10.0EPSS: 4%CPEs: 14EXPL: 0

Buffer overflow in the sun.awt.windows.WDefaultFontCharset Java class implementation in Netscape 4.0 allows remote attackers to execute arbitrary code via an applet that calls the WDefaultFontCharset constructor with a long string and invokes the canConvert method. • http://marc.info/?l=bugtraq&m=103834439321292&w=2 http://www.securityfocus.com/bid/6256 https://exchange.xforce.ibmcloud.com/vulnerabilities/10706 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 9EXPL: 2

The Web Publishing feature in Netscape Enterprise Server 3.x and iPlanet Web Server 4.x allows remote attackers to cause a denial of service (crash) via a wp-html-rend request. • http://cert.uni-stuttgart.de/archive/vulnwatch/2002/01/msg00007.html http://www.kb.cert.org/vuls/id/191763 http://www.kb.cert.org/vuls/id/AAMN-567N48 http://www.procheckup.com/security_info/vuln_pr0104.html http://www.securityfocus.com/bid/3826 https://exchange.xforce.ibmcloud.com/vulnerabilities/7842 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 2

Buffer overflow in Composer in Netscape 4.77 allows local users to overwrite process memory and execute arbitrary code via a font tag with a long face attribute. • https://www.exploit-db.com/exploits/21544 http://online.securityfocus.com/archive/1/276876 http://www.securityfocus.com/bid/5010 https://exchange.xforce.ibmcloud.com/vulnerabilities/9355 •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

Heap-based buffer overflow in Netscape 6.2.3 and Mozilla 1.0 and earlier allows remote attackers to crash client browsers and execute arbitrary code via a PNG image with large width and height values and an 8-bit or 16-bit alpha channel. • http://bugzilla.mozilla.org/show_bug.cgi?id=157202 http://www.iss.net/security_center/static/9287.php http://www.mandriva.com/security/advisories?name=MDKSA-2002:074 http://www.mozilla.org/releases/mozilla1.0.1/security-fixes-1.0.1.html •