代码搜索:NETSCAPE
找到约 6,619 项符合「NETSCAPE」的源代码
代码结果 6,619
www.eeworm.com/read/350572/10731679
java wrongdestination.java
package coreservlets;
import java.io.*;
import javax.servlet.*;
import javax.servlet.http.*;
/** Servlet that sends IE users to the Netscape home page and
* Netscape (and all other) users t
www.eeworm.com/read/418779/10904135
txt 2657.txt
Rule:
--
Sid:
2657
--
Summary:
This event is generated when an attempt is made to exploit a vulnerability
associated with Netscape Network Security Services (NSS) message parsing.
--
Impact:
A succ
www.eeworm.com/read/418779/10913222
txt 1842.txt
Rule:
--
Sid:
1842
--
Summary:
This event is generated when a remote attacker sends a malformed
argument in the LOGIN command to an internal IMAP server, indicating an
attempt to exploit a buffer ov
www.eeworm.com/read/418779/10916157
txt 1103.txt
Rule:
--
Sid:
1103
--
Summary:
This event is generated when a client is requesting a file that may
contain an administrator name and password.
--
Impact:
An attacker may be able to gain administrato
www.eeworm.com/read/418779/10916496
txt 2656.txt
Rule:
--
Sid:
2656
--
Summary:
This event is generated when an attempt is made to exploit a vulnerability
associated with Netscape Network Security Services (NSS) message parsing.
--
Impact:
A succ
www.eeworm.com/read/418779/10916612
txt 1841.txt
Rule:
--
Sid:
1841
--
Summary:
This event is generated when a client on the protected network has possibly visited a website containing malicious javascript code.
--
Impact:
Minimal
--
Detailed In
www.eeworm.com/read/418779/10918871
txt 1844.txt
Rule:
--
Sid:
1844
--
Summary:
This event is generated when a remote attacker sends an overly long argument in the AUTHENTICATE command to an internal IMAP server, indicating an attempt to exploit a
www.eeworm.com/read/418779/10918995
txt 1930.txt
Rule:
--
Sid:
1930
--
Summary:
This event is generated when a remote attacker sends an overly long
argument in the AUTH command to an internal IMAP server, indicating an
attempt to exploit a buffer