Show filters
83 Total Results
Displaying 71-80 of 83
Sort by:
Attacker Value
Unknown

CVE-2002-1289

Disclosure Date: November 29, 2002 (last updated February 22, 2025)
The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to read restricted process memory, cause a denial of service (crash), and possibly execute arbitrary code via the getNativeServices function, which creates an instance of the com.ms.awt.peer.INativeServices (INativeServices) class, whose methods do not verify the memory addresses that are passed as parameters.
0
Attacker Value
Unknown

CVE-2002-1293

Disclosure Date: November 29, 2002 (last updated February 22, 2025)
The Microsoft Java implementation, as used in Internet Explorer, provides a public load0() method for the CabCracker class (com.ms.vm.loader.CabCracker), which allows remote attackers to bypass the security checks that are performed by the load() method.
0
Attacker Value
Unknown

CVE-2002-1288

Disclosure Date: November 29, 2002 (last updated February 22, 2025)
The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to determine the current directory of the Internet Explorer process via the getAbsolutePath() method in a File() call.
0
Attacker Value
Unknown

CVE-2002-0865

Disclosure Date: October 11, 2002 (last updated February 22, 2025)
A certain class that supports XML (Extensible Markup Language) in Microsoft Virtual Machine (VM) 5.0.3805 and earlier, probably com.ms.osp.ospmrshl, exposes certain unsafe methods, which allows remote attackers to execute unsafe code via a Java applet, aka "Inappropriate Methods Exposed in XML Support Classes."
0
Attacker Value
Unknown

CVE-2002-0866

Disclosure Date: October 11, 2002 (last updated February 22, 2025)
Java Database Connectivity (JDBC) classes in Microsoft Virtual Machine (VM) up to and including 5.0.3805 allow remote attackers to load and execute DLLs (dynamic link libraries) via a Java applet that calls the constructor for com.ms.jdbc.odbc.JdbcOdbc with the desired DLL terminated by a null string, aka "DLL Execution via JDBC Classes."
0
Attacker Value
Unknown

CVE-2002-0867

Disclosure Date: October 11, 2002 (last updated February 22, 2025)
Microsoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote attackers to cause a denial of service (crash) in Internet Explorer via invalid handle data in a Java applet, aka "Handle Validation Flaw."
0
Attacker Value
Unknown

CVE-2002-0979

Disclosure Date: September 24, 2002 (last updated February 22, 2025)
The Java logging feature for the Java Virtual Machine in Internet Explorer writes output from functions such as System.out.println to a known pathname, which can be used to execute arbitrary code.
0
Attacker Value
Unknown

CVE-2002-0076

Disclosure Date: March 19, 2002 (last updated February 22, 2025)
Java Runtime Environment (JRE) Bytecode Verifier allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, as seen in (1) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, (2) Netscape 6.2.1 and earlier, and possibly other implementations that use vulnerable versions of SDK or JDK, aka a variant of the "Virtual Machine Verifier" vulnerability.
0
Attacker Value
Unknown

CVE-2002-0058

Disclosure Date: March 15, 2002 (last updated February 22, 2025)
Vulnerability in Java Runtime Environment (JRE) allows remote malicious web sites to hijack or sniff a web client's sessions, when an HTTP proxy is being used, via a Java applet that redirects the session to another server, as seen in (1) Netscape 6.0 through 6.1 and 4.79 and earlier, (2) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, and possibly other implementations that use vulnerable versions of SDK or JDK.
0
Attacker Value
Unknown

CVE-2000-0711

Disclosure Date: October 20, 2000 (last updated February 22, 2025)
Netscape Communicator does not properly prevent a ServerSocket object from being created by untrusted entities, which allows remote attackers to create a server on the victim's system via a malicious applet, as demonstrated by Brown Orifice.
0