This CPE summary could be partial or incomplete. Please contact us for a detailed listing.
Summary
Detail | |||
---|---|---|---|
Vendor | Netscape | First view | 2004-12-31 |
Product | Personalization Engine | Last view | 2004-12-31 |
Version | * | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:netscape:personalization_engine |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2004-12-31 | CVE-2004-0826 | Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message. |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-47 | Buffer Overflow via Parameter Expansion |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
9116 | Netscape Network Security Services (NSS) Library SSLv2 Challenge Overflow |
OpenVAS Exploits
id | Description |
---|---|
2008-09-04 | Name : FreeBSD Ports: nss File : nvt/freebsd_nss.nasl |
2005-11-03 | Name : NSS Library SSLv2 Challenge Overflow File : nvt/sslv2_hello_overflow.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | SSLv2 Client_Hello Challenge Length overflow attempt RuleID : 2656-community - Type : SERVER-WEBAPP - Revision : 22 |
2014-01-10 | SSLv2 Client_Hello Challenge Length overflow attempt RuleID : 2656 - Type : SERVER-WEBAPP - Revision : 22 |
2014-01-10 | SSLv1 Client_Hello Challenge Length overflow attempt RuleID : 15897 - Type : WEB-MISC - Revision : 4 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2009-04-23 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_207f8ff3f69711d881b0000347a4fa7d.nasl - Type: ACT_GATHER_INFO |
2004-08-24 | Name: The remote service is susceptible to a buffer overflow attack. File: sslv2_hello_overflow.nasl - Type: ACT_MIXED_ATTACK |