Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
virtual machine vulnerabilities and exploits
(subscribe to this query)
7.6
CVSSv2
CVE-2000-0327
Microsoft Virtual Machine (VM) allows remote malicious users to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, aka the "Virtual Machine Verifier" vulnerability.
Microsoft Virtual Machine 2000
Microsoft Virtual Machine 3000
2.6
CVSSv2
CVE-2000-0132
Microsoft Java Virtual Machine allows remote malicious users to read files via the getSystemResourceAsStream function.
Microsoft Virtual Machine 3000
Microsoft Virtual Machine 2000
1 EDB exploit
7.5
CVSSv2
CVE-2003-0111
The ByteCode Verifier component of Microsoft Virtual Machine (VM) build 5.0.3809 and previous versions, as used in Windows and Internet Explorer, allows remote malicious users to bypass security checks and execute arbitrary code via a malicious Java applet, aka "Flaw in Micr...
Microsoft Virtual Machine 3802
Microsoft Virtual Machine 3805
Microsoft Virtual Machine 3809
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
1 EDB exploit
NA
CVE-2022-39419
Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19c and 21c. Easily exploitable vulnerability allows low privileged attacker having Create Procedure privilege with network access via Oracle Net to compromise Java VM. Succ...
Oracle Java Virtual Machine 19c
Oracle Java Virtual Machine 21c
NA
CVE-2022-39429
Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19c and 21c. Easily exploitable vulnerability allows low privileged attacker having Create Procedure privilege with network access via Oracle Net to compromise Java VM. Succ...
Oracle Java Virtual Machine 19c
Oracle Java Virtual Machine 21c
9
CVSSv2
CVE-2010-1035
Multiple unspecified vulnerabilities in HP Virtual Machine Manager (VMM) prior to 6.0 allow remote authenticated users to execute arbitrary code via unknown vectors.
Hp Insight Virtual Machine Management 3.6.1
Hp Insight Virtual Machine Management
7.5
CVSSv2
CVE-2002-0979
The Java logging feature for the Java Virtual Machine in Internet Explorer writes output from functions such as System.out.println to a known pathname, which can be used to execute arbitrary code.
Microsoft Virtual Machine
9.3
CVSSv2
CVE-1999-0766
The Microsoft Java Virtual Machine allows a malicious Java applet to execute arbitrary commands outside of the sandbox environment.
Microsoft Java Virtual Machine
4.3
CVSSv2
CVE-2014-9714
Cross-site scripting (XSS) vulnerability in the WddxPacket::recursiveAddVar function in HHVM (aka the HipHop Virtual Machine) prior to 3.5.0 allows remote malicious users to inject arbitrary web script or HTML via a crafted string to the wddx_serialize_value function.
Facebook Hiphop Virtual Machine
7.5
CVSSv2
CVE-2014-2208
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) prior to 2.4.2 allows remote malicious users to execute arbitrary commands by entering a \n (newline) character before the end of a st...
Facebook Hiphop Virtual Machine
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »