Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
virtual machine vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2002-1287
Stack-based buffer overflow in the Microsoft Java implementation, as used in Internet Explorer, allows remote malicious users to cause a denial of service via a long class name through (1) Class.forName or (2) ClassLoader.loadClass.
Microsoft Java Virtual Machine 1.1
5
CVSSv2
CVE-2002-1288
The Microsoft Java implementation, as used in Internet Explorer, allows remote malicious users to determine the current directory of the Internet Explorer process via the getAbsolutePath() method in a File() call.
Microsoft Java Virtual Machine 1.1
6.4
CVSSv2
CVE-2002-1290
The Microsoft Java implementation, as used in Internet Explorer, allows remote malicious users to read and modify the contents of the Clipboard via an applet that accesses the (1) ClipBoardGetText and (2) ClipBoardSetText methods of the INativeServices class.
Microsoft Java Virtual Machine 1.1
5
CVSSv2
CVE-2002-1291
The Microsoft Java implementation, as used in Internet Explorer, allows remote malicious users to read arbitrary local files and network shares via an applet tag with a codebase set to a "file://%00" (null character) URL.
Microsoft Java Virtual Machine 1.1
7.5
CVSSv2
CVE-2002-1293
The Microsoft Java implementation, as used in Internet Explorer, provides a public load0() method for the CabCracker class (com.ms.vm.loader.CabCracker), which allows remote malicious users to bypass the security checks that are performed by the load() method.
Microsoft Java Virtual Machine 1.1
7.5
CVSSv2
CVE-2002-1294
The Microsoft Java implementation, as used in Internet Explorer, can provide HTML object references to applets via Javascript, which allows remote malicious users to cause a denial of service (crash due to illegal memory accesses) and possibly conduct other unauthorized activitie...
Microsoft Java Virtual Machine 1.1
7.5
CVSSv2
CVE-2002-1289
The Microsoft Java implementation, as used in Internet Explorer, allows remote malicious users to read restricted process memory, cause a denial of service (crash), and possibly execute arbitrary code via the getNativeServices function, which creates an instance of the com.ms.awt...
Microsoft Java Virtual Machine 1.1
7.5
CVSSv2
CVE-2002-1292
The Microsoft Java virtual machine (VM) build 5.0.3805 and previous versions, as used in Internet Explorer, allows remote malicious users to extend the Standard Security Manager (SSM) class (com.ms.security.StandardSecurityManager) and bypass intended StandardSecurityManager rest...
Microsoft Java Virtual Machine 1.1
7.5
CVSSv2
CVE-2002-1295
The Microsoft Java implementation, as used in Internet Explorer, allows remote malicious users to cause a denial of service (crash) and possibly conduct other unauthorized activities via applet tags in HTML that bypass Java class restrictions (such as private constructors) by pro...
Microsoft Java Virtual Machine 1.1
6.4
CVSSv2
CVE-2004-0723
Microsoft Java virtual machine (VM) 5.0.0.3810 allows remote malicious users to bypass sandbox restrictions to read or write certain data between applets from different domains via the "GET/Key" and "PUT/Key/Value" commands, aka "cross-site Java."
Microsoft Java Virtual Machine 5.0.0.3810
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »