Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft virtual machine vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2002-0867
Microsoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote malicious users to cause a denial of service (crash) in Internet Explorer via invalid handle data in a Java applet, aka "Handle Validation Flaw."
Microsoft Virtual Machine 3200
Microsoft Virtual Machine 3300
Microsoft Virtual Machine 3100
Microsoft Virtual Machine 3188
Microsoft Virtual Machine 2000
Microsoft Virtual Machine 3000
Microsoft Virtual Machine 3802
Microsoft Virtual Machine 3805
7.5
CVSSv2
CVE-2002-0865
A certain class that supports XML (Extensible Markup Language) in Microsoft Virtual Machine (VM) 5.0.3805 and previous versions, probably com.ms.osp.ospmrshl, exposes certain unsafe methods, which allows remote malicious users to execute unsafe code via a Java applet, aka "I...
Microsoft Virtual Machine 3300
Microsoft Virtual Machine 3802
Microsoft Virtual Machine 3188
Microsoft Virtual Machine 3200
Microsoft Virtual Machine 3000
Microsoft Virtual Machine 3100
Microsoft Virtual Machine 2000
Microsoft Virtual Machine 3805
7.5
CVSSv2
CVE-2002-0866
Java Database Connectivity (JDBC) classes in Microsoft Virtual Machine (VM) up to and including 5.0.3805 allow remote malicious users to load and execute DLLs (dynamic link libraries) via a Java applet that calls the constructor for com.ms.jdbc.odbc.JdbcOdbc with the desired DLL ...
Microsoft Virtual Machine 3300
Microsoft Virtual Machine 3802
Microsoft Virtual Machine 3100
Microsoft Virtual Machine 3188
Microsoft Virtual Machine 3200
Microsoft Virtual Machine 2000
Microsoft Virtual Machine 3000
Microsoft Virtual Machine 3805
1 EDB exploit
7.6
CVSSv2
CVE-2000-0327
Microsoft Virtual Machine (VM) allows remote malicious users to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, aka the "Virtual Machine Verifier" vulnerability.
Microsoft Virtual Machine 2000
Microsoft Virtual Machine 3000
2.6
CVSSv2
CVE-2000-0132
Microsoft Java Virtual Machine allows remote malicious users to read files via the getSystemResourceAsStream function.
Microsoft Virtual Machine 3000
Microsoft Virtual Machine 2000
1 EDB exploit
7.5
CVSSv2
CVE-2003-0111
The ByteCode Verifier component of Microsoft Virtual Machine (VM) build 5.0.3809 and previous versions, as used in Windows and Internet Explorer, allows remote malicious users to bypass security checks and execute arbitrary code via a malicious Java applet, aka "Flaw in Micr...
Microsoft Virtual Machine 3802
Microsoft Virtual Machine 3805
Microsoft Virtual Machine 3809
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
1 EDB exploit
7.5
CVSSv2
CVE-2002-0979
The Java logging feature for the Java Virtual Machine in Internet Explorer writes output from functions such as System.out.println to a known pathname, which can be used to execute arbitrary code.
Microsoft Virtual Machine
9.3
CVSSv2
CVE-1999-0766
The Microsoft Java Virtual Machine allows a malicious Java applet to execute arbitrary commands outside of the sandbox environment.
Microsoft Java Virtual Machine
5
CVSSv2
CVE-2002-1291
The Microsoft Java implementation, as used in Internet Explorer, allows remote malicious users to read arbitrary local files and network shares via an applet tag with a codebase set to a "file://%00" (null character) URL.
Microsoft Java Virtual Machine 1.1
7.5
CVSSv2
CVE-2002-1286
The Microsoft Java implementation, as used in Internet Explorer, allows remote malicious users to steal cookies and execute script in a different security context via a URL that contains a colon in the domain portion, which is not properly parsed and loads an applet from a malici...
Microsoft Java Virtual Machine 1.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-17519
open redirect
CVE-2024-21683
cache poisoning
CVE-2021-47524
CVE-2021-47521
CVE-2024-5229
CVE-2021-47560
local
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »