Page 7 of 35 results (0.005 seconds)

CVSS: 7.5EPSS: 5%CPEs: 13EXPL: 0

The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages. • http://java.sun.com/pr/1999/03/pr990329-01.html http://marc.info/?l=bugtraq&m=92333596624452&w=2 http://www.securityfocus.com/bid/1939 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

A configuration in a web browser such as Internet Explorer or Netscape Navigator allows execution of active content such as ActiveX, Java, Javascript, etc. • https://www.cve.org/CVERecord?id=CVE-1999-0537 •

CVSS: 5.1EPSS: 0%CPEs: 5EXPL: 0

Java in Netscape 4.5 does not properly restrict applets from connecting to other hosts besides the one from which the applet was loaded, which violates the Java security model and could allow remote attackers to conduct unauthorized activities. • http://www.securityfocus.com/archive/1/12231 https://exchange.xforce.ibmcloud.com/vulnerabilities/1727 •

CVSS: 2.6EPSS: 21%CPEs: 5EXPL: 0

JavaScript in Internet Explorer 3.x and 4.x, and Netscape 2.x, 3.x and 4.x, allows remote attackers to monitor a user's web activities, aka the Bell Labs vulnerability. • http://www.codetalker.com/advisories/vendor/hp/hpsbux9707-065.html •

CVSS: 6.4EPSS: 3%CPEs: 7EXPL: 1

The view-source CGI program allows remote attackers to read arbitrary files via a .. (dot dot) attack. • https://www.exploit-db.com/exploits/20568 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0174 •