CVE-2000-0676
Published Oct 20, 2000
Last updated 16 years ago
Overview
- Description
- Netscape Communicator and Navigator 4.04 through 4.74 allows remote attackers to read arbitrary files by using a Java applet to open a connection to a URL using the "file", "http", "https", and "ftp" protocols, as demonstrated by Brown Orifice.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:netscape:communicator:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "209C7BB1-EFDF-43AB-9FB6-DF67465DEAEF" }, { "criteria": "cpe:2.3:a:netscape:communicator:4.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94F9EFE4-7853-4809-8D94-03B3EFD739E5" }, { "criteria": "cpe:2.3:a:netscape:communicator:4.05:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "494AFC1E-67A3-41CA-B920-B8F778B68A99" }, { "criteria": "cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E9A5461-B0F2-49DB-A69C-3D2D27709647" }, { "criteria": "cpe:2.3:a:netscape:communicator:4.5_beta:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "213EB326-33D1-4329-A6BB-B1AA1C626E44" }, { "criteria": "cpe:2.3:a:netscape:communicator:4.06:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34F6328B-44A8-4E45-918E-C54285040BFE" }, { "criteria": "cpe:2.3:a:netscape:communicator:4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "529E3F71-6016-461D-A162-0DBDD5505389" }, { "criteria": "cpe:2.3:a:netscape:communicator:4.07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31D02C4D-3FD1-425F-B0DB-7808089BCD0B" }, { "criteria": "cpe:2.3:a:netscape:communicator:4.08:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61268CF9-E279-4F63-B228-F9ED4B93BB99" }, { "criteria": "cpe:2.3:a:netscape:communicator:4.51:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "918BE44C-8D64-4040-BC74-802AA3FA4E10" }, { "criteria": "cpe:2.3:a:netscape:communicator:4.61:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AA534C4-9411-44EC-AA34-2287C79AD235" }, { "criteria": "cpe:2.3:a:netscape:communicator:4.72:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A4E8588-A941-4759-B41C-00F193F2C63B" }, { "criteria": "cpe:2.3:a:netscape:communicator:4.73:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E48C051-EB45-4262-86C2-2333FD5C7745" }, { "criteria": "cpe:2.3:a:netscape:communicator:4.74:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA48AF1E-99EF-419C-B425-001C7134C6BB" } ], "operator": "OR" } ] } ]