Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft virtual machine 3188 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-0866
Java Database Connectivity (JDBC) classes in Microsoft Virtual Machine (VM) up to and including 5.0.3805 allow remote malicious users to load and execute DLLs (dynamic link libraries) via a Java applet that calls the constructor for com.ms.jdbc.odbc.JdbcOdbc with the desired DLL ...
Microsoft Virtual Machine 3300
Microsoft Virtual Machine 3802
Microsoft Virtual Machine 3100
Microsoft Virtual Machine 3188
Microsoft Virtual Machine 3200
Microsoft Virtual Machine 2000
Microsoft Virtual Machine 3000
Microsoft Virtual Machine 3805
1 EDB exploit
NA
CVE-2002-0867
Microsoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote malicious users to cause a denial of service (crash) in Internet Explorer via invalid handle data in a Java applet, aka "Handle Validation Flaw."
Microsoft Virtual Machine 3200
Microsoft Virtual Machine 3300
Microsoft Virtual Machine 3100
Microsoft Virtual Machine 3188
Microsoft Virtual Machine 2000
Microsoft Virtual Machine 3000
Microsoft Virtual Machine 3802
Microsoft Virtual Machine 3805
NA
CVE-2002-0865
A certain class that supports XML (Extensible Markup Language) in Microsoft Virtual Machine (VM) 5.0.3805 and previous versions, probably com.ms.osp.ospmrshl, exposes certain unsafe methods, which allows remote malicious users to execute unsafe code via a Java applet, aka "I...
Microsoft Virtual Machine 3300
Microsoft Virtual Machine 3802
Microsoft Virtual Machine 3188
Microsoft Virtual Machine 3200
Microsoft Virtual Machine 3000
Microsoft Virtual Machine 3100
Microsoft Virtual Machine 2000
Microsoft Virtual Machine 3805
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started