Show filters
83 Total Results
Displaying 61-70 of 83
Sort by:
Attacker Value
Unknown
CVE-2007-5375
Disclosure Date: October 11, 2007 (last updated October 04, 2023)
Interpretation conflict in the Sun Java Virtual Machine (JVM) allows user-assisted remote attackers to conduct a multi-pin DNS rebinding attack and execute arbitrary JavaScript in an intranet context, when an intranet web server has an HTML document that references a "mayscript=true" Java applet through a local relative URI, which may be associated with different IP addresses by the browser and the JVM.
0
Attacker Value
Unknown
CVE-2004-0723
Disclosure Date: July 27, 2004 (last updated February 22, 2025)
Microsoft Java virtual machine (VM) 5.0.0.3810 allows remote attackers to bypass sandbox restrictions to read or write certain data between applets from different domains via the "GET/Key" and "PUT/Key/Value" commands, aka "cross-site Java."
0
Attacker Value
Unknown
CVE-2003-0111
Disclosure Date: May 05, 2003 (last updated February 22, 2025)
The ByteCode Verifier component of Microsoft Virtual Machine (VM) build 5.0.3809 and earlier, as used in Windows and Internet Explorer, allows remote attackers to bypass security checks and execute arbitrary code via a malicious Java applet, aka "Flaw in Microsoft VM Could Enable System Compromise."
0
Attacker Value
Unknown
CVE-2002-1292
Disclosure Date: November 29, 2002 (last updated February 22, 2025)
The Microsoft Java virtual machine (VM) build 5.0.3805 and earlier, as used in Internet Explorer, allows remote attackers to extend the Standard Security Manager (SSM) class (com.ms.security.StandardSecurityManager) and bypass intended StandardSecurityManager restrictions by modifying the (1) deniedDefinitionPackages or (2) deniedAccessPackages settings, causing a denial of service by adding Java applets to the list of applets that are prevented from running.
0
Attacker Value
Unknown
CVE-2002-1294
Disclosure Date: November 29, 2002 (last updated February 22, 2025)
The Microsoft Java implementation, as used in Internet Explorer, can provide HTML object references to applets via Javascript, which allows remote attackers to cause a denial of service (crash due to illegal memory accesses) and possibly conduct other unauthorized activities via an applet that uses those references to access proprietary Microsoft methods.
0
Attacker Value
Unknown
CVE-2002-1286
Disclosure Date: November 29, 2002 (last updated February 22, 2025)
The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to steal cookies and execute script in a different security context via a URL that contains a colon in the domain portion, which is not properly parsed and loads an applet from a malicious site within the security context of the site that is being visited by the user.
0
Attacker Value
Unknown
CVE-2002-1295
Disclosure Date: November 29, 2002 (last updated February 22, 2025)
The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to cause a denial of service (crash) and possibly conduct other unauthorized activities via applet tags in HTML that bypass Java class restrictions (such as private constructors) by providing the class name in the code parameter, aka "Incomplete Java Object Instantiation Vulnerability."
0
Attacker Value
Unknown
CVE-2002-1287
Disclosure Date: November 29, 2002 (last updated February 22, 2025)
Stack-based buffer overflow in the Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to cause a denial of service via a long class name through (1) Class.forName or (2) ClassLoader.loadClass.
0
Attacker Value
Unknown
CVE-2002-1290
Disclosure Date: November 29, 2002 (last updated February 22, 2025)
The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to read and modify the contents of the Clipboard via an applet that accesses the (1) ClipBoardGetText and (2) ClipBoardSetText methods of the INativeServices class.
0
Attacker Value
Unknown
CVE-2002-1291
Disclosure Date: November 29, 2002 (last updated February 22, 2025)
The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to read arbitrary local files and network shares via an applet tag with a codebase set to a "file://%00" (null character) URL.
0