Page 8 of 39 results (0.030 seconds)

CVSS: 7.5EPSS: 3%CPEs: 93EXPL: 0

Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message. • http://marc.info/?l=bugtraq&m=109351293827731&w=2 http://www.securityfocus.com/bid/11015 http://xforce.iss.net/xforce/alerts/id/180 https://exchange.xforce.ibmcloud.com/vulnerabilities/16314 •

CVSS: 7.5EPSS: 4%CPEs: 11EXPL: 4

iPlanet Web Server Enterprise Edition and Netscape Enterprise Server 4.0 and 4.1 allows remote attackers to conduct HTTP Basic Authentication via the wp-force-auth Web Publisher command, which provides a distinct attack vector and may make it easier to conduct brute force password guessing without detection. • http://lists.virus.org/vulnwatch-0201/msg00008.html http://securitytracker.com/id?1003157 http://www.kb.cert.org/vuls/id/985347 http://www.kb.cert.org/vuls/id/AAMN-567NFX http://www.procheckup.com/vulnerabilities/pr0105.html http://www.securiteam.com/securitynews/5IP0G0060Q.html http://www.securityfocus.com/bid/3831 https://exchange.xforce.ibmcloud.com/vulnerabilities/7845 •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 1

Default configuration of the search engine in Netscape Enterprise Server 3.5.1, and possibly other versions, allows remote attackers to read the source of JHTML files by specifying a search command using the HTML-tocrec-demo1.pat pattern file. • https://www.exploit-db.com/exploits/19443 http://marc.info/?l=bugtraq&m=93346448121208&w=2 http://marc.info/?l=ntbugtraq&m=93337389603117&w=2 http://www.securityfocus.com/bid/559 •

CVSS: 5.0EPSS: 0%CPEs: 22EXPL: 0

Information from SSL-encrypted sessions via PKCS #1. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •