Vulnerabilites related to microsoft - virtual_machine
cve-2003-0111
Vulnerability from cvelistv5
Published
2003-04-15 04:00
Modified
2024-08-08 01:43
Severity ?
EPSS score ?
Summary
The ByteCode Verifier component of Microsoft Virtual Machine (VM) build 5.0.3809 and earlier, as used in Windows and Internet Explorer, allows remote attackers to bypass security checks and execute arbitrary code via a malicious Java applet, aka "Flaw in Microsoft VM Could Enable System Compromise."
References
▼ | URL | Tags |
---|---|---|
http://www.iss.net/security_center/static/11751.php | vdb-entry, x_refsource_XF | |
http://www.kb.cert.org/vuls/id/447569 | third-party-advisory, x_refsource_CERT-VN | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-011 | vendor-advisory, x_refsource_MS | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A136 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:43:35.608Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "msvm-bytecode-improper-validation(11751)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/11751.php" }, { "name": "VU#447569", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/447569" }, { "name": "MS03-011", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-011" }, { "name": "oval:org.mitre.oval:def:136", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A136" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-04-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The ByteCode Verifier component of Microsoft Virtual Machine (VM) build 5.0.3809 and earlier, as used in Windows and Internet Explorer, allows remote attackers to bypass security checks and execute arbitrary code via a malicious Java applet, aka \"Flaw in Microsoft VM Could Enable System Compromise.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "msvm-bytecode-improper-validation(11751)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/11751.php" }, { "name": "VU#447569", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/447569" }, { "name": "MS03-011", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-011" }, { "name": "oval:org.mitre.oval:def:136", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A136" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0111", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ByteCode Verifier component of Microsoft Virtual Machine (VM) build 5.0.3809 and earlier, as used in Windows and Internet Explorer, allows remote attackers to bypass security checks and execute arbitrary code via a malicious Java applet, aka \"Flaw in Microsoft VM Could Enable System Compromise.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "msvm-bytecode-improper-validation(11751)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/11751.php" }, { "name": "VU#447569", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/447569" }, { "name": "MS03-011", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-011" }, { "name": "oval:org.mitre.oval:def:136", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A136" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0111", "datePublished": "2003-04-15T04:00:00", "dateReserved": "2003-02-26T00:00:00", "dateUpdated": "2024-08-08T01:43:35.608Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0866
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 03:03
Severity ?
EPSS score ?
Summary
Java Database Connectivity (JDBC) classes in Microsoft Virtual Machine (VM) up to and including 5.0.3805 allow remote attackers to load and execute DLLs (dynamic link libraries) via a Java applet that calls the constructor for com.ms.jdbc.odbc.JdbcOdbc with the desired DLL terminated by a null string, aka "DLL Execution via JDBC Classes."
References
▼ | URL | Tags |
---|---|---|
http://www.iss.net/security_center/static/10133.php | vdb-entry, x_refsource_XF | |
http://www.kb.cert.org/vuls/id/307306 | third-party-advisory, x_refsource_CERT-VN | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052 | vendor-advisory, x_refsource_MS | |
http://www.securityfocus.com/bid/5751 | vdb-entry, x_refsource_BID | |
http://archives.neohapsis.com/archives/bugtraq/2002-09/0271.html | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:03:49.171Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "msvm-jdbc-dll-execution(10133)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10133.php" }, { "name": "VU#307306", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/307306" }, { "name": "MS02-052", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052" }, { "name": "5751", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5751" }, { "name": "20020923 Technical information about the vulnerabilities fixed by MS-02-52", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-09/0271.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-09-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Java Database Connectivity (JDBC) classes in Microsoft Virtual Machine (VM) up to and including 5.0.3805 allow remote attackers to load and execute DLLs (dynamic link libraries) via a Java applet that calls the constructor for com.ms.jdbc.odbc.JdbcOdbc with the desired DLL terminated by a null string, aka \"DLL Execution via JDBC Classes.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-07-25T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "msvm-jdbc-dll-execution(10133)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10133.php" }, { "name": "VU#307306", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/307306" }, { "name": "MS02-052", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052" }, { "name": "5751", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5751" }, { "name": "20020923 Technical information about the vulnerabilities fixed by MS-02-52", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-09/0271.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0866", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Java Database Connectivity (JDBC) classes in Microsoft Virtual Machine (VM) up to and including 5.0.3805 allow remote attackers to load and execute DLLs (dynamic link libraries) via a Java applet that calls the constructor for com.ms.jdbc.odbc.JdbcOdbc with the desired DLL terminated by a null string, aka \"DLL Execution via JDBC Classes.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "msvm-jdbc-dll-execution(10133)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10133.php" }, { "name": "VU#307306", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/307306" }, { "name": "MS02-052", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052" }, { "name": "5751", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5751" }, { "name": "20020923 Technical information about the vulnerabilities fixed by MS-02-52", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-09/0271.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0866", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2002-08-15T00:00:00", "dateUpdated": "2024-08-08T03:03:49.171Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0867
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 03:03
Severity ?
EPSS score ?
Summary
Microsoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote attackers to cause a denial of service (crash) in Internet Explorer via invalid handle data in a Java applet, aka "Handle Validation Flaw."
References
▼ | URL | Tags |
---|---|---|
http://www.iss.net/security_center/static/10134.php | vdb-entry, x_refsource_XF | |
http://www.kb.cert.org/vuls/id/792881 | third-party-advisory, x_refsource_CERT-VN | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052 | vendor-advisory, x_refsource_MS | |
http://www.securityfocus.com/bid/5750 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:03:49.362Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "msvm-jdbc-ie-dos(10134)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10134.php" }, { "name": "VU#792881", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/792881" }, { "name": "MS02-052", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052" }, { "name": "5750", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5750" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-09-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Microsoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote attackers to cause a denial of service (crash) in Internet Explorer via invalid handle data in a Java applet, aka \"Handle Validation Flaw.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-07-25T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "msvm-jdbc-ie-dos(10134)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10134.php" }, { "name": "VU#792881", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/792881" }, { "name": "MS02-052", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052" }, { "name": "5750", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5750" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0867", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Microsoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote attackers to cause a denial of service (crash) in Internet Explorer via invalid handle data in a Java applet, aka \"Handle Validation Flaw.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "msvm-jdbc-ie-dos(10134)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10134.php" }, { "name": "VU#792881", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/792881" }, { "name": "MS02-052", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052" }, { "name": "5750", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5750" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0867", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2002-08-15T00:00:00", "dateUpdated": "2024-08-08T03:03:49.362Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0132
Vulnerability from cvelistv5
Published
2000-02-08 05:00
Modified
2024-08-08 05:05
Severity ?
EPSS score ?
Summary
Microsoft Java Virtual Machine allows remote attackers to read files via the getSystemResourceAsStream function.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/957 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:05:53.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "957", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/957" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-01-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Microsoft Java Virtual Machine allows remote attackers to read files via the getSystemResourceAsStream function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-21T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "957", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/957" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0132", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Microsoft Java Virtual Machine allows remote attackers to read files via the getSystemResourceAsStream function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "957", "refsource": "BID", "url": "http://www.securityfocus.com/bid/957" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0132", "datePublished": "2000-02-08T05:00:00", "dateReserved": "2000-02-08T00:00:00", "dateUpdated": "2024-08-08T05:05:53.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0865
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 03:03
Severity ?
EPSS score ?
Summary
A certain class that supports XML (Extensible Markup Language) in Microsoft Virtual Machine (VM) 5.0.3805 and earlier, probably com.ms.osp.ospmrshl, exposes certain unsafe methods, which allows remote attackers to execute unsafe code via a Java applet, aka "Inappropriate Methods Exposed in XML Support Classes."
References
▼ | URL | Tags |
---|---|---|
http://www.iss.net/security_center/static/10135.php | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/5752 | vdb-entry, x_refsource_BID | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052 | vendor-advisory, x_refsource_MS | |
http://www.kb.cert.org/vuls/id/140898 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:03:49.222Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "msvm-xml-methods-access(10135)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/10135.php" }, { "name": "5752", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5752" }, { "name": "MS02-052", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052" }, { "name": "VU#140898", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/140898" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-09-20T00:00:00", "descriptions": [ { "lang": "en", "value": "A certain class that supports XML (Extensible Markup Language) in Microsoft Virtual Machine (VM) 5.0.3805 and earlier, probably com.ms.osp.ospmrshl, exposes certain unsafe methods, which allows remote attackers to execute unsafe code via a Java applet, aka \"Inappropriate Methods Exposed in XML Support Classes.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-07-25T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "msvm-xml-methods-access(10135)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/10135.php" }, { "name": "5752", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5752" }, { "name": "MS02-052", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052" }, { "name": "VU#140898", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/140898" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0865", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A certain class that supports XML (Extensible Markup Language) in Microsoft Virtual Machine (VM) 5.0.3805 and earlier, probably com.ms.osp.ospmrshl, exposes certain unsafe methods, which allows remote attackers to execute unsafe code via a Java applet, aka \"Inappropriate Methods Exposed in XML Support Classes.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "msvm-xml-methods-access(10135)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/10135.php" }, { "name": "5752", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5752" }, { "name": "MS02-052", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052" }, { "name": "VU#140898", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/140898" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0865", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2002-08-15T00:00:00", "dateUpdated": "2024-08-08T03:03:49.222Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0711
Vulnerability from cvelistv5
Published
2000-10-13 04:00
Modified
2024-08-08 05:28
Severity ?
EPSS score ?
Summary
Netscape Communicator does not properly prevent a ServerSocket object from being created by untrusted entities, which allows remote attackers to create a server on the victim's system via a malicious applet, as demonstrated by Brown Orifice.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/templates/archive.pike?list=1&msg=3999922128E.EE84TAKAGI%40java-house.etl.go.jp | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/1545 | vdb-entry, x_refsource_BID | |
http://www.cert.org/advisories/CA-2000-15.html | third-party-advisory, x_refsource_CERT | |
http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000805020429.11774.qmail%40securityfocus.com | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:28:40.763Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20000816 JDK 1.1.x Listening Socket Vulnerability (was Re: BrownOrifice can break firewalls!)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=3999922128E.EE84TAKAGI%40java-house.etl.go.jp" }, { "name": "1545", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1545" }, { "name": "CA-2000-15", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-2000-15.html" }, { "name": "20000805 Dangerous Java/Netscape Security Hole", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=20000805020429.11774.qmail%40securityfocus.com" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-08-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Netscape Communicator does not properly prevent a ServerSocket object from being created by untrusted entities, which allows remote attackers to create a server on the victim\u0027s system via a malicious applet, as demonstrated by Brown Orifice." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20000816 JDK 1.1.x Listening Socket Vulnerability (was Re: BrownOrifice can break firewalls!)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=3999922128E.EE84TAKAGI%40java-house.etl.go.jp" }, { "name": "1545", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1545" }, { "name": "CA-2000-15", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-2000-15.html" }, { "name": "20000805 Dangerous Java/Netscape Security Hole", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=20000805020429.11774.qmail%40securityfocus.com" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0711", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Netscape Communicator does not properly prevent a ServerSocket object from being created by untrusted entities, which allows remote attackers to create a server on the victim\u0027s system via a malicious applet, as demonstrated by Brown Orifice." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20000816 JDK 1.1.x Listening Socket Vulnerability (was Re: BrownOrifice can break firewalls!)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=3999922128E.EE84TAKAGI@java-house.etl.go.jp" }, { "name": "1545", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1545" }, { "name": "CA-2000-15", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2000-15.html" }, { "name": "20000805 Dangerous Java/Netscape Security Hole", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=20000805020429.11774.qmail@securityfocus.com" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0711", "datePublished": "2000-10-13T04:00:00", "dateReserved": "2000-09-19T00:00:00", "dateUpdated": "2024-08-08T05:28:40.763Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0979
Vulnerability from cvelistv5
Published
2002-08-23 04:00
Modified
2024-08-08 03:12
Severity ?
EPSS score ?
Summary
The Java logging feature for the Java Virtual Machine in Internet Explorer writes output from functions such as System.out.println to a known pathname, which can be used to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=102961031107261&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.iss.net/security_center/static/9886.php | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/5491 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:12:16.549Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20020817 Enableing java logging in MSIE is dangerous", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=102961031107261\u0026w=2" }, { "name": "ie-javalogging-code-execution(9886)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/9886.php" }, { "name": "5491", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/5491" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-08-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Java logging feature for the Java Virtual Machine in Internet Explorer writes output from functions such as System.out.println to a known pathname, which can be used to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20020817 Enableing java logging in MSIE is dangerous", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=102961031107261\u0026w=2" }, { "name": "ie-javalogging-code-execution(9886)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/9886.php" }, { "name": "5491", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/5491" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0979", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Java logging feature for the Java Virtual Machine in Internet Explorer writes output from functions such as System.out.println to a known pathname, which can be used to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20020817 Enableing java logging in MSIE is dangerous", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=102961031107261\u0026w=2" }, { "name": "ie-javalogging-code-execution(9886)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/9886.php" }, { "name": "5491", "refsource": "BID", "url": "http://www.securityfocus.com/bid/5491" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0979", "datePublished": "2002-08-23T04:00:00", "dateReserved": "2002-08-21T00:00:00", "dateUpdated": "2024-08-08T03:12:16.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0058
Vulnerability from cvelistv5
Published
2002-03-07 05:00
Modified
2024-08-08 02:35
Severity ?
EPSS score ?
Summary
Vulnerability in Java Runtime Environment (JRE) allows remote malicious web sites to hijack or sniff a web client's sessions, when an HTTP proxy is being used, via a Java applet that redirects the session to another server, as seen in (1) Netscape 6.0 through 6.1 and 4.79 and earlier, (2) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, and possibly other implementations that use vulnerable versions of SDK or JDK.
References
▼ | URL | Tags |
---|---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013 | vendor-advisory, x_refsource_MS | |
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/216 | vendor-advisory, x_refsource_SUN | |
http://marc.info/?l=bugtraq&m=101534535304228&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:35:17.473Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MS02-013", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013" }, { "name": "00216", "tags": [ "vendor-advisory", "x_refsource_SUN", "x_transferred" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/216" }, { "name": "20020305 Java HTTP proxy vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=101534535304228\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-03-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Vulnerability in Java Runtime Environment (JRE) allows remote malicious web sites to hijack or sniff a web client\u0027s sessions, when an HTTP proxy is being used, via a Java applet that redirects the session to another server, as seen in (1) Netscape 6.0 through 6.1 and 4.79 and earlier, (2) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, and possibly other implementations that use vulnerable versions of SDK or JDK." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "MS02-013", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013" }, { "name": "00216", "tags": [ "vendor-advisory", "x_refsource_SUN" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/216" }, { "name": "20020305 Java HTTP proxy vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=101534535304228\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0058", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in Java Runtime Environment (JRE) allows remote malicious web sites to hijack or sniff a web client\u0027s sessions, when an HTTP proxy is being used, via a Java applet that redirects the session to another server, as seen in (1) Netscape 6.0 through 6.1 and 4.79 and earlier, (2) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, and possibly other implementations that use vulnerable versions of SDK or JDK." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MS02-013", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013" }, { "name": "00216", "refsource": "SUN", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/216" }, { "name": "20020305 Java HTTP proxy vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=101534535304228\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0058", "datePublished": "2002-03-07T05:00:00", "dateReserved": "2002-02-02T00:00:00", "dateUpdated": "2024-08-08T02:35:17.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0076
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 02:35
Severity ?
EPSS score ?
Summary
Java Runtime Environment (JRE) Bytecode Verifier allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, as seen in (1) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, (2) Netscape 6.2.1 and earlier, and possibly other implementations that use vulnerable versions of SDK or JDK, aka a variant of the "Virtual Machine Verifier" vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013 | vendor-advisory, x_refsource_MS | |
http://www.iss.net/security_center/static/8480.php | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/4313 | vdb-entry, x_refsource_BID | |
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/218 | vendor-advisory, x_refsource_SUN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:35:17.438Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MS02-013", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013" }, { "name": "java-vm-verifier-variant(8480)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/8480.php" }, { "name": "4313", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4313" }, { "name": "00218", "tags": [ "vendor-advisory", "x_refsource_SUN", "x_transferred" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/218" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Java Runtime Environment (JRE) Bytecode Verifier allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, as seen in (1) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, (2) Netscape 6.2.1 and earlier, and possibly other implementations that use vulnerable versions of SDK or JDK, aka a variant of the \"Virtual Machine Verifier\" vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-20T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "MS02-013", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013" }, { "name": "java-vm-verifier-variant(8480)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/8480.php" }, { "name": "4313", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4313" }, { "name": "00218", "tags": [ "vendor-advisory", "x_refsource_SUN" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/218" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0076", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Java Runtime Environment (JRE) Bytecode Verifier allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, as seen in (1) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, (2) Netscape 6.2.1 and earlier, and possibly other implementations that use vulnerable versions of SDK or JDK, aka a variant of the \"Virtual Machine Verifier\" vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MS02-013", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013" }, { "name": "java-vm-verifier-variant(8480)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/8480.php" }, { "name": "4313", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4313" }, { "name": "00218", "refsource": "SUN", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/218" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0076", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-02-21T00:00:00", "dateUpdated": "2024-08-08T02:35:17.438Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0327
Vulnerability from cvelistv5
Published
2000-06-02 04:00
Modified
2024-08-08 05:14
Severity ?
EPSS score ?
Summary
Microsoft Virtual Machine (VM) allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, aka the "Virtual Machine Verifier" vulnerability.
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=93993545118416&w=2 | mailing-list, x_refsource_BUGTRAQ | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-045 | vendor-advisory, x_refsource_MS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:14:21.229Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19991014 Another Microsoft Java Flaw Disovered", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=93993545118416\u0026w=2" }, { "name": "MS99-045", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-045" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1999-10-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Microsoft Virtual Machine (VM) allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, aka the \"Virtual Machine Verifier\" vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "19991014 Another Microsoft Java Flaw Disovered", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=93993545118416\u0026w=2" }, { "name": "MS99-045", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-045" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0327", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Microsoft Virtual Machine (VM) allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, aka the \"Virtual Machine Verifier\" vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19991014 Another Microsoft Java Flaw Disovered", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=93993545118416\u0026w=2" }, { "name": "MS99-045", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-045" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0327", "datePublished": "2000-06-02T04:00:00", "dateReserved": "2000-05-11T00:00:00", "dateUpdated": "2024-08-08T05:14:21.229Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2000-10-20 04:00
Modified
2024-11-20 23:33
Severity ?
Summary
Netscape Communicator does not properly prevent a ServerSocket object from being created by untrusted entities, which allows remote attackers to create a server on the victim's system via a malicious applet, as demonstrated by Brown Orifice.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | virtual_machine | 2000 | |
microsoft | virtual_machine | 3100 | |
microsoft | virtual_machine | 3200 | |
microsoft | virtual_machine | 3300 | |
netscape | communicator | 4.0 | |
netscape | communicator | 4.04 | |
netscape | communicator | 4.05 | |
netscape | communicator | 4.5 | |
netscape | communicator | 4.06 | |
netscape | communicator | 4.6 | |
netscape | communicator | 4.07 | |
netscape | communicator | 4.7 | |
netscape | communicator | 4.08 | |
netscape | communicator | 4.51 | |
netscape | communicator | 4.61 | |
netscape | communicator | 4.72 | |
netscape | communicator | 4.73 | |
netscape | communicator | 4.74 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:virtual_machine:2000:*:*:*:*:*:*:*", "matchCriteriaId": "A299BA2B-FD34-4FD5-8A4B-EA99DA9BA3EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3100:*:*:*:*:*:*:*", "matchCriteriaId": "CB67AEF8-DD02-4F20-B920-AC0B26D47C98", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3200:*:*:*:*:*:*:*", "matchCriteriaId": "D133B730-EEDA-46E7-8CC4-4D0104D65C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3300:*:*:*:*:*:*:*", "matchCriteriaId": "962D0B64-8EEE-4589-84B3-D504906AEEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:communicator:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "209C7BB1-EFDF-43AB-9FB6-DF67465DEAEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:communicator:4.04:*:*:*:*:*:*:*", "matchCriteriaId": "94F9EFE4-7853-4809-8D94-03B3EFD739E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:communicator:4.05:*:*:*:*:*:*:*", "matchCriteriaId": "494AFC1E-67A3-41CA-B920-B8F778B68A99", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*", "matchCriteriaId": "4E9A5461-B0F2-49DB-A69C-3D2D27709647", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:communicator:4.06:*:*:*:*:*:*:*", "matchCriteriaId": "34F6328B-44A8-4E45-918E-C54285040BFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:communicator:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "529E3F71-6016-461D-A162-0DBDD5505389", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:communicator:4.07:*:*:*:*:*:*:*", "matchCriteriaId": "31D02C4D-3FD1-425F-B0DB-7808089BCD0B", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:communicator:4.7:*:*:*:*:*:*:*", "matchCriteriaId": "38FD74F5-12ED-4049-B06F-0F22A0254C0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:communicator:4.08:*:*:*:*:*:*:*", "matchCriteriaId": "61268CF9-E279-4F63-B228-F9ED4B93BB99", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:communicator:4.51:*:*:*:*:*:*:*", "matchCriteriaId": "918BE44C-8D64-4040-BC74-802AA3FA4E10", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:communicator:4.61:*:*:*:*:*:*:*", "matchCriteriaId": "6AA534C4-9411-44EC-AA34-2287C79AD235", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:communicator:4.72:*:*:*:*:*:*:*", "matchCriteriaId": "3A4E8588-A941-4759-B41C-00F193F2C63B", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:communicator:4.73:*:*:*:*:*:*:*", "matchCriteriaId": "3E48C051-EB45-4262-86C2-2333FD5C7745", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:communicator:4.74:*:*:*:*:*:*:*", "matchCriteriaId": "BA48AF1E-99EF-419C-B425-001C7134C6BB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Netscape Communicator does not properly prevent a ServerSocket object from being created by untrusted entities, which allows remote attackers to create a server on the victim\u0027s system via a malicious applet, as demonstrated by Brown Orifice." } ], "id": "CVE-2000-0711", "lastModified": "2024-11-20T23:33:07.183", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2000-15.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1545" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=20000805020429.11774.qmail%40securityfocus.com" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=3999922128E.EE84TAKAGI%40java-house.etl.go.jp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2000-15.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=20000805020429.11774.qmail%40securityfocus.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=3999922128E.EE84TAKAGI%40java-house.etl.go.jp" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-03-15 05:00
Modified
2024-11-20 23:38
Severity ?
Summary
Vulnerability in Java Runtime Environment (JRE) allows remote malicious web sites to hijack or sniff a web client's sessions, when an HTTP proxy is being used, via a Java applet that redirects the session to another server, as seen in (1) Netscape 6.0 through 6.1 and 4.79 and earlier, (2) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, and possibly other implementations that use vulnerable versions of SDK or JDK.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3802:*:*:*:*:*:*:*", "matchCriteriaId": "FB10F6CD-E12B-469B-8634-2185172D97D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.1.8:update13:*:*:*:*:*:*", "matchCriteriaId": "2F99B49A-5A04-4EC8-ABD7-1BEAF620C0DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.1.8:update7:*:*:*:*:*:*", "matchCriteriaId": "D6A18370-9054-48F5-8766-D4A15F3A67C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.1.8:update13:*:*:*:*:*:*", "matchCriteriaId": "672D93D0-49FF-4569-8FEC-91BC7F066CB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.1.8:update7:*:*:*:*:*:*", "matchCriteriaId": "02FD7344-2D3A-447F-90B1-7035ABB23152", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.2.2:update10:*:*:*:*:*:*", "matchCriteriaId": "2F330C06-5DAA-433F-B1AB-71362E328095", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*", "matchCriteriaId": "8966374E-426B-42A7-9D62-9A9A14032390", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.1.8_007:*:*:*:*:*:*:*", "matchCriteriaId": "72893C77-F9B6-4828-AD2B-90B4E49F16B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.2.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "47627A45-F60E-46E5-BD9C-AE67CF6B5D39", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.2.2_010:*:*:*:*:*:*:*", "matchCriteriaId": "9998A074-A556-4A8B-A0CE-3355AF78C3CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3_02:*:*:*:*:*:*:*", "matchCriteriaId": "E9005550-FC5E-4EB4-8261-BB9A48CF644B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in Java Runtime Environment (JRE) allows remote malicious web sites to hijack or sniff a web client\u0027s sessions, when an HTTP proxy is being used, via a Java applet that redirects the session to another server, as seen in (1) Netscape 6.0 through 6.1 and 4.79 and earlier, (2) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, and possibly other implementations that use vulnerable versions of SDK or JDK." }, { "lang": "es", "value": "Esta vulnerabilidad en el \"Java Runtime Enviroment\" (entorno de ejecuci\u00f3n de Java, JRE), permite que sitios web maliciosos husmeen las sesiones de los clientes web, a trav\u00e9s de un applet de Java que redirige la sesi\u00f3n a otros servidor. Esto se ha visto en (1)versiones de Netscape 6.0 hasta 6.1 y las anteriores a la 4.79, (2) M\u00e1quina Virtual de Microsoft (build 3802 y anteriores) usada en Internet Explorer 4.x y 5.x, y posiblemente otras implementaciones que usan versiones vulnerables de SDK y JDK." } ], "id": "CVE-2002-0058", "lastModified": "2024-11-20T23:38:12.113", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-03-15T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=101534535304228\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/216" }, { "source": "cve@mitre.org", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=101534535304228\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-09-24 04:00
Modified
2024-11-20 23:40
Severity ?
Summary
The Java logging feature for the Java Virtual Machine in Internet Explorer writes output from functions such as System.out.println to a known pathname, which can be used to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | virtual_machine | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:virtual_machine:*:*:*:*:*:*:*:*", "matchCriteriaId": "D27CE372-36F6-4777-85B3-1B45A20D8360", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Java logging feature for the Java Virtual Machine in Internet Explorer writes output from functions such as System.out.println to a known pathname, which can be used to execute arbitrary code." }, { "lang": "es", "value": "La caracter\u00edstica de registro (logging) de la M\u00e1quina Virtual de Java en Internet Explorer escribe la salida de funciones como System.out.println a una ruta conocida, lo que puede ser usado para ejecutar c\u00f3digo arbitrario." } ], "id": "CVE-2002-0979", "lastModified": "2024-11-20T23:40:18.907", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-09-24T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=102961031107261\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/9886.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/5491" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=102961031107261\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/9886.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/5491" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-10-11 04:00
Modified
2024-11-20 23:40
Severity ?
Summary
Microsoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote attackers to cause a denial of service (crash) in Internet Explorer via invalid handle data in a Java applet, aka "Handle Validation Flaw."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | virtual_machine | 2000 | |
microsoft | virtual_machine | 3000 | |
microsoft | virtual_machine | 3100 | |
microsoft | virtual_machine | 3188 | |
microsoft | virtual_machine | 3200 | |
microsoft | virtual_machine | 3300 | |
microsoft | virtual_machine | 3802 | |
microsoft | virtual_machine | 3805 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:virtual_machine:2000:*:*:*:*:*:*:*", "matchCriteriaId": "A299BA2B-FD34-4FD5-8A4B-EA99DA9BA3EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3000:*:*:*:*:*:*:*", "matchCriteriaId": "DC2655D3-B360-4F82-B9CE-EECC95E0FAEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3100:*:*:*:*:*:*:*", "matchCriteriaId": "CB67AEF8-DD02-4F20-B920-AC0B26D47C98", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3188:*:*:*:*:*:*:*", "matchCriteriaId": "B798772D-183C-4EE8-8E78-E37CCEC35B43", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3200:*:*:*:*:*:*:*", "matchCriteriaId": "D133B730-EEDA-46E7-8CC4-4D0104D65C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3300:*:*:*:*:*:*:*", "matchCriteriaId": "962D0B64-8EEE-4589-84B3-D504906AEEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3802:*:*:*:*:*:*:*", "matchCriteriaId": "FB10F6CD-E12B-469B-8634-2185172D97D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3805:*:*:*:*:*:*:*", "matchCriteriaId": "FBBEEAFB-9087-40C0-85A8-AAC82F6CD6D1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote attackers to cause a denial of service (crash) in Internet Explorer via invalid handle data in a Java applet, aka \"Handle Validation Flaw.\"" }, { "lang": "es", "value": "la M\u00e1quina Virtual (VM) de Microsoft hasta compilaci\u00f3n 5.0.3805 inclusive, permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) en Internet Explorer mediante un manejador (handle) inv\u00e1lido en un applet de Java, tambi\u00e9n conocida como \"Fallo en Validaci\u00f3n de Manejador\"" } ], "id": "CVE-2002-0867", "lastModified": "2024-11-20T23:40:04.100", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-10-11T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10134.php" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/792881" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/5750" }, { "source": "cve@mitre.org", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10134.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/792881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/5750" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-05-05 04:00
Modified
2024-11-20 23:43
Severity ?
Summary
The ByteCode Verifier component of Microsoft Virtual Machine (VM) build 5.0.3809 and earlier, as used in Windows and Internet Explorer, allows remote attackers to bypass security checks and execute arbitrary code via a malicious Java applet, aka "Flaw in Microsoft VM Could Enable System Compromise."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3802:*:*:*:*:*:*:*", "matchCriteriaId": "FB10F6CD-E12B-469B-8634-2185172D97D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3805:*:*:*:*:*:*:*", "matchCriteriaId": "FBBEEAFB-9087-40C0-85A8-AAC82F6CD6D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3809:*:*:*:*:*:*:*", "matchCriteriaId": "C16D6A0B-3321-4444-B0DB-E0F8DD66DEB9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "294EBA01-147B-4DA0-937E-ACBB655EDE53", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "4E8B7346-F2AA-434C-A048-7463EC1BB117", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "BE1A6107-DE00-4A1C-87FC-9E4015165B5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D34EFE5-22B7-4E8D-B5B2-2423C37CFFA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:*", "matchCriteriaId": "8208AFC9-0EFC-4A90-AD5A-FD94F5542885", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:*", "matchCriteriaId": "4D4168AE-D19E-482E-8F2B-3E798B2D84E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp3:*:*:*:*:*:*", "matchCriteriaId": "B5E149E7-B748-44F6-BB55-68D5BF87AF41", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ByteCode Verifier component of Microsoft Virtual Machine (VM) build 5.0.3809 and earlier, as used in Windows and Internet Explorer, allows remote attackers to bypass security checks and execute arbitrary code via a malicious Java applet, aka \"Flaw in Microsoft VM Could Enable System Compromise.\"" }, { "lang": "es", "value": "El componente Verificador de ByteCode de la M\u00e1quina Virtual (VW) de Microsoft compilaci\u00f3n 5.0.3809 y anteriores, usada en en Windows y en Internet Explorer, permite a atacantes remotos eludir comprobaciones de seguridad y ejecutar c\u00f3digo arbitrario mediante un applet de Java malicioso, tambi\u00e9n conocido como \"Fallo en Microsoft VW Podr\u00eda Permitir Compromiso del Sistema\"" } ], "id": "CVE-2003-0111", "lastModified": "2024-11-20T23:43:58.993", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-05-05T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/11751.php" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/447569" }, { "source": "cve@mitre.org", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-011" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/11751.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/447569" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-011" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A136" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-10-11 04:00
Modified
2024-11-20 23:40
Severity ?
Summary
Java Database Connectivity (JDBC) classes in Microsoft Virtual Machine (VM) up to and including 5.0.3805 allow remote attackers to load and execute DLLs (dynamic link libraries) via a Java applet that calls the constructor for com.ms.jdbc.odbc.JdbcOdbc with the desired DLL terminated by a null string, aka "DLL Execution via JDBC Classes."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | virtual_machine | 2000 | |
microsoft | virtual_machine | 3000 | |
microsoft | virtual_machine | 3100 | |
microsoft | virtual_machine | 3188 | |
microsoft | virtual_machine | 3200 | |
microsoft | virtual_machine | 3300 | |
microsoft | virtual_machine | 3802 | |
microsoft | virtual_machine | 3805 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:virtual_machine:2000:*:*:*:*:*:*:*", "matchCriteriaId": "A299BA2B-FD34-4FD5-8A4B-EA99DA9BA3EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3000:*:*:*:*:*:*:*", "matchCriteriaId": "DC2655D3-B360-4F82-B9CE-EECC95E0FAEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3100:*:*:*:*:*:*:*", "matchCriteriaId": "CB67AEF8-DD02-4F20-B920-AC0B26D47C98", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3188:*:*:*:*:*:*:*", "matchCriteriaId": "B798772D-183C-4EE8-8E78-E37CCEC35B43", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3200:*:*:*:*:*:*:*", "matchCriteriaId": "D133B730-EEDA-46E7-8CC4-4D0104D65C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3300:*:*:*:*:*:*:*", "matchCriteriaId": "962D0B64-8EEE-4589-84B3-D504906AEEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3802:*:*:*:*:*:*:*", "matchCriteriaId": "FB10F6CD-E12B-469B-8634-2185172D97D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3805:*:*:*:*:*:*:*", "matchCriteriaId": "FBBEEAFB-9087-40C0-85A8-AAC82F6CD6D1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Java Database Connectivity (JDBC) classes in Microsoft Virtual Machine (VM) up to and including 5.0.3805 allow remote attackers to load and execute DLLs (dynamic link libraries) via a Java applet that calls the constructor for com.ms.jdbc.odbc.JdbcOdbc with the desired DLL terminated by a null string, aka \"DLL Execution via JDBC Classes.\"" }, { "lang": "es", "value": "Las clases Java de conectividad con bases de datos (JDBC) en Microsoft Virtual Machine (VM) hasta 5.0.3805 inclusive permite a atacantes remotos cargar y ejecutar DLLs (librer\u00edas de enlace din\u00e1mico) mediante un applet de Java. Tambi\u00e9n conocida como \"Ejecuci\u00f3n DLL mediante clases JDBC\"." } ], "id": "CVE-2002-0866", "lastModified": "2024-11-20T23:40:03.933", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-10-11T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-09/0271.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10133.php" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/307306" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/5751" }, { "source": "cve@mitre.org", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-09/0271.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10133.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/307306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/5751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-03-19 05:00
Modified
2024-11-20 23:38
Severity ?
Summary
Java Runtime Environment (JRE) Bytecode Verifier allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, as seen in (1) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, (2) Netscape 6.2.1 and earlier, and possibly other implementations that use vulnerable versions of SDK or JDK, aka a variant of the "Virtual Machine Verifier" vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
hp | java_jre-jdk | 1.1.8 | |
hp | java_jre-jdk | 1.2.2 | |
hp | java_jre-jdk | 1.3 | |
microsoft | virtual_machine | 3802 | |
sun | jdk | 1.1.8 | |
sun | jdk | 1.1.8 | |
sun | jre | 1.1.8 | |
sun | jre | 1.1.8 | |
sun | jre | 1.2.2 | |
sun | jre | 1.3.0 | |
sun | jre | 1.3.1 | |
sun | jre | 1.3.1 | |
sun | sdk | 1.2.2_10 | |
sun | sdk | 1.2.2_010 | |
sun | sdk | 1.3.1_01 | |
sun | sdk | 1.3.1_01a | |
sun | sdk | 1.3_05 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:java_jre-jdk:1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "8B5D2FA9-8C0B-4018-8EE3-6BF79E182DB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:java_jre-jdk:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "19ABD387-E3C6-49E3-9E8B-46ED7D70DA6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:java_jre-jdk:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "4DC61EC3-7299-41F3-9CBC-15D86F515266", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3802:*:*:*:*:*:*:*", "matchCriteriaId": "FB10F6CD-E12B-469B-8634-2185172D97D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.1.8:update14:*:*:*:*:*:*", "matchCriteriaId": "E58C529E-0D46-46A2-A6F3-894ECB215A65", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.1.8:update8:*:*:*:*:*:*", "matchCriteriaId": "4053D51D-57A9-495F-9B8D-0076661283EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.1.8:update14:*:*:*:*:*:*", "matchCriteriaId": "F3375977-9C9F-48C6-80D6-7BC26389BE3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.1.8:update8:*:*:*:*:*:*", "matchCriteriaId": "DC661221-300B-4730-A26E-33DD10355E23", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.2.2:update10:*:*:*:*:*:*", "matchCriteriaId": "2F330C06-5DAA-433F-B1AB-71362E328095", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*", "matchCriteriaId": "A06743B3-2637-47C2-BD1A-28D9F584ED75", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*", "matchCriteriaId": "F7F1CF2B-F0B6-45DD-88E1-C0BDF2B973BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.3.1:update1a:*:*:*:*:*:*", "matchCriteriaId": "04FB9247-7DB5-46A1-9E99-C25A729FB5D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.2.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "47627A45-F60E-46E5-BD9C-AE67CF6B5D39", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.2.2_010:*:*:*:*:*:*:*", "matchCriteriaId": "9998A074-A556-4A8B-A0CE-3355AF78C3CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01:*:*:*:*:*:*:*", "matchCriteriaId": "34710306-D6CF-4D07-84BF-71A8839BE416", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3.1_01a:*:*:*:*:*:*:*", "matchCriteriaId": "44B93DC8-6375-4B41-B9BC-F22F592C56B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.3_05:*:*:*:*:*:*:*", "matchCriteriaId": "50E18066-F22D-48D3-A7BD-A51F68052BDF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Java Runtime Environment (JRE) Bytecode Verifier allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, as seen in (1) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, (2) Netscape 6.2.1 and earlier, and possibly other implementations that use vulnerable versions of SDK or JDK, aka a variant of the \"Virtual Machine Verifier\" vulnerability." }, { "lang": "es", "value": "El verificador de bytecode del \"Java Runtime Enviroment\" (entorno de ejecuci\u00f3n de java), permite que atacantes remotos se salten la \"sandbox\" (caja de arena) de Java y ejecuten comandos a trav\u00e9s de un applet que tiene una conversi\u00f3n de tipo ilegal. \u00c9sto se ha comprobado en (1) la m\u00e1quina virtual de Microsoft (3802 y anteriores) que se usa en el MS Internet Explorer 4.x y 5.x, (2) Netscape 6.2.1 y anteriores y posiblmente en otras implementaciones que usan versiones vulnerables del SDK o JDK. Este vulnerabilidad es una variante de aquella conocida como vulnerabilidad en \"Verificador de la M\u00e1quina Virtual\"." } ], "id": "CVE-2002-0076", "lastModified": "2024-11-20T23:38:15.023", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-03-19T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/218" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/8480.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/4313" }, { "source": "cve@mitre.org", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/218" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/8480.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/4313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-013" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1999-10-21 04:00
Modified
2024-11-20 23:32
Severity ?
Summary
Microsoft Virtual Machine (VM) allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, aka the "Virtual Machine Verifier" vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | virtual_machine | 2000 | |
microsoft | virtual_machine | 3000 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:virtual_machine:2000:*:*:*:*:*:*:*", "matchCriteriaId": "A299BA2B-FD34-4FD5-8A4B-EA99DA9BA3EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3000:*:*:*:*:*:*:*", "matchCriteriaId": "DC2655D3-B360-4F82-B9CE-EECC95E0FAEE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Virtual Machine (VM) allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, aka the \"Virtual Machine Verifier\" vulnerability." } ], "id": "CVE-2000-0327", "lastModified": "2024-11-20T23:32:14.820", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "1999-10-21T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=93993545118416\u0026w=2" }, { "source": "cve@mitre.org", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-045" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=93993545118416\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-045" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-01-31 05:00
Modified
2024-11-20 23:31
Severity ?
Summary
Microsoft Java Virtual Machine allows remote attackers to read files via the getSystemResourceAsStream function.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | virtual_machine | 2000 | |
microsoft | virtual_machine | 3000 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:virtual_machine:2000:*:*:*:*:*:*:*", "matchCriteriaId": "A299BA2B-FD34-4FD5-8A4B-EA99DA9BA3EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3000:*:*:*:*:*:*:*", "matchCriteriaId": "DC2655D3-B360-4F82-B9CE-EECC95E0FAEE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Java Virtual Machine allows remote attackers to read files via the getSystemResourceAsStream function." } ], "id": "CVE-2000-0132", "lastModified": "2024-11-20T23:31:47.460", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2000-01-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/957" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-10-11 04:00
Modified
2024-11-20 23:40
Severity ?
Summary
A certain class that supports XML (Extensible Markup Language) in Microsoft Virtual Machine (VM) 5.0.3805 and earlier, probably com.ms.osp.ospmrshl, exposes certain unsafe methods, which allows remote attackers to execute unsafe code via a Java applet, aka "Inappropriate Methods Exposed in XML Support Classes."
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | virtual_machine | 2000 | |
microsoft | virtual_machine | 3000 | |
microsoft | virtual_machine | 3100 | |
microsoft | virtual_machine | 3188 | |
microsoft | virtual_machine | 3200 | |
microsoft | virtual_machine | 3300 | |
microsoft | virtual_machine | 3802 | |
microsoft | virtual_machine | 3805 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:virtual_machine:2000:*:*:*:*:*:*:*", "matchCriteriaId": "A299BA2B-FD34-4FD5-8A4B-EA99DA9BA3EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3000:*:*:*:*:*:*:*", "matchCriteriaId": "DC2655D3-B360-4F82-B9CE-EECC95E0FAEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3100:*:*:*:*:*:*:*", "matchCriteriaId": "CB67AEF8-DD02-4F20-B920-AC0B26D47C98", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3188:*:*:*:*:*:*:*", "matchCriteriaId": "B798772D-183C-4EE8-8E78-E37CCEC35B43", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3200:*:*:*:*:*:*:*", "matchCriteriaId": "D133B730-EEDA-46E7-8CC4-4D0104D65C11", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3300:*:*:*:*:*:*:*", "matchCriteriaId": "962D0B64-8EEE-4589-84B3-D504906AEEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3802:*:*:*:*:*:*:*", "matchCriteriaId": "FB10F6CD-E12B-469B-8634-2185172D97D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:virtual_machine:3805:*:*:*:*:*:*:*", "matchCriteriaId": "FBBEEAFB-9087-40C0-85A8-AAC82F6CD6D1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A certain class that supports XML (Extensible Markup Language) in Microsoft Virtual Machine (VM) 5.0.3805 and earlier, probably com.ms.osp.ospmrshl, exposes certain unsafe methods, which allows remote attackers to execute unsafe code via a Java applet, aka \"Inappropriate Methods Exposed in XML Support Classes.\"" }, { "lang": "es", "value": "Una clase que soporta XML (Lenguaje de Marcas eXtensible) en Microsoft Virtual Machine (VM) 5.0.3805 y anteriores expone cierto m\u00e9todos inseguros, que permiten a atacantes remotos ejecutar c\u00f3digo inseguro mediante un applet de Java. Tambi\u00e9n conocida como \"M\u00e9todos inapropiados expuestos en clases de soporte XML\"" } ], "id": "CVE-2002-0865", "lastModified": "2024-11-20T23:40:03.793", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-10-11T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10135.php" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/140898" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/5752" }, { "source": "cve@mitre.org", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/10135.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/140898" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/5752" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }