Total
8 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-1999-0853 | 1 Netscape | 2 Enterprise Server, Fasttrack Server | 2024-02-28 | 10.0 HIGH | N/A |
Buffer overflow in Netscape Enterprise Server and Netscape FastTrack Server allows remote attackers to gain privileges via the HTTP Basic Authentication procedure. | |||||
CVE-1999-0744 | 1 Netscape | 2 Enterprise Server, Fasttrack Server | 2024-02-28 | 7.5 HIGH | N/A |
Buffer overflow in Netscape Enterprise Server and FastTrask Server allows remote attackers to gain privileges via a long HTTP GET request. | |||||
CVE-1999-0758 | 1 Netscape | 2 Enterprise Server, Fasttrack Server | 2024-02-28 | 5.0 MEDIUM | N/A |
Netscape Enterprise 3.5.1 and FastTrack 3.01 servers allow a remote attacker to view source code to scripts by appending a %20 to the script's URL. | |||||
CVE-1999-0239 | 1 Netscape | 1 Fasttrack Server | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
Netscape FastTrack Web server lists files when a lowercase "get" command is used instead of an uppercase GET. | |||||
CVE-1999-0007 | 5 C2net, Hp, Microsoft and 2 more | 13 Stonghold Web Server, Open Market Secure Webserver, Exchange Server and 10 more | 2024-02-28 | 5.0 MEDIUM | N/A |
Information from SSL-encrypted sessions via PKCS #1. | |||||
CVE-2000-0308 | 2 Netscape, Sco | 4 Enterprise Server, Fasttrack Server, Proxy Server and 1 more | 2024-02-28 | 10.0 HIGH | N/A |
Insecure file permissions for Netscape FastTrack Server 2.x, Enterprise Server 2.0, and Proxy Server 2.5 in SCO UnixWare 7.0.x and 2.1.3 allow an attacker to gain root privileges. | |||||
CVE-1999-0012 | 2 Microsoft, Netscape | 5 Frontpage, Internet Information Server, Personal Web Server and 2 more | 2024-02-28 | 5.0 MEDIUM | N/A |
Some web servers under Microsoft Windows allow remote attackers to bypass access restrictions for files with long file names. | |||||
CVE-2001-0175 | 1 Netscape | 1 Fasttrack Server | 2024-02-28 | 5.0 MEDIUM | N/A |
The caching module in Netscape Fasttrack Server 4.1 allows remote attackers to cause a denial of service (resource exhaustion) by requesting a large number of non-existent URLs. |