Microsoft

Java Virtual Machine

12 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 3.82%
  • Published 27.07.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

Microsoft Java virtual machine (VM) 5.0.0.3810 allows remote attackers to bypass sandbox restrictions to read or write certain data between applets from different domains via the "GET/Key" and "PUT/Key/Value" commands, aka "cross-site Java."

  • EPSS 6.95%
  • Published 29.11.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to steal cookies and execute script in a different security context via a URL that contains a colon in the domain portion, which is not properly parsed and loads...

  • EPSS 6.1%
  • Published 29.11.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

Stack-based buffer overflow in the Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to cause a denial of service via a long class name through (1) Class.forName or (2) ClassLoader.loadClass.

  • EPSS 8.79%
  • Published 29.11.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to determine the current directory of the Internet Explorer process via the getAbsolutePath() method in a File() call.

  • EPSS 6.46%
  • Published 29.11.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to read restricted process memory, cause a denial of service (crash), and possibly execute arbitrary code via the getNativeServices function, which creates an in...

  • EPSS 4.83%
  • Published 29.11.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to read and modify the contents of the Clipboard via an applet that accesses the (1) ClipBoardGetText and (2) ClipBoardSetText methods of the INativeServices cla...

  • EPSS 10.29%
  • Published 29.11.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to read arbitrary local files and network shares via an applet tag with a codebase set to a "file://%00" (null character) URL.

  • EPSS 7.68%
  • Published 29.11.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

The Microsoft Java virtual machine (VM) build 5.0.3805 and earlier, as used in Internet Explorer, allows remote attackers to extend the Standard Security Manager (SSM) class (com.ms.security.StandardSecurityManager) and bypass intended StandardSecuri...

  • EPSS 2.52%
  • Published 29.11.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

The Microsoft Java implementation, as used in Internet Explorer, provides a public load0() method for the CabCracker class (com.ms.vm.loader.CabCracker), which allows remote attackers to bypass the security checks that are performed by the load() met...

  • EPSS 5.59%
  • Published 29.11.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

The Microsoft Java implementation, as used in Internet Explorer, can provide HTML object references to applets via Javascript, which allows remote attackers to cause a denial of service (crash due to illegal memory accesses) and possibly conduct othe...