This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Netscape First view 2004-12-31
Product Personalization Engine Last view 2004-12-31
Version * Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:netscape:personalization_engine

Activity : Overall

Related : CVE

  Date Alert Description
7.5 2004-12-31 CVE-2004-0826

Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message.

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-47 Buffer Overflow via Parameter Expansion

Open Source Vulnerability Database (OSVDB)

id Description
9116 Netscape Network Security Services (NSS) Library SSLv2 Challenge Overflow

OpenVAS Exploits

id Description
2008-09-04 Name : FreeBSD Ports: nss
File : nvt/freebsd_nss.nasl
2005-11-03 Name : NSS Library SSLv2 Challenge Overflow
File : nvt/sslv2_hello_overflow.nasl

Snort® IPS/IDS

Date Description
2014-01-10 SSLv2 Client_Hello Challenge Length overflow attempt
RuleID : 2656-community - Type : SERVER-WEBAPP - Revision : 22
2014-01-10 SSLv2 Client_Hello Challenge Length overflow attempt
RuleID : 2656 - Type : SERVER-WEBAPP - Revision : 22
2014-01-10 SSLv1 Client_Hello Challenge Length overflow attempt
RuleID : 15897 - Type : WEB-MISC - Revision : 4

Nessus® Vulnerability Scanner

id Description
2009-04-23 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_207f8ff3f69711d881b0000347a4fa7d.nasl - Type: ACT_GATHER_INFO
2004-08-24 Name: The remote service is susceptible to a buffer overflow attack.
File: sslv2_hello_overflow.nasl - Type: ACT_MIXED_ATTACK