Page 2 of 10 results (0.008 seconds)

CVSS: 7.5EPSS: 4%CPEs: 1EXPL: 0

The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to read restricted process memory, cause a denial of service (crash), and possibly execute arbitrary code via the getNativeServices function, which creates an instance of the com.ms.awt.peer.INativeServices (INativeServices) class, whose methods do not verify the memory addresses that are passed as parameters. • http://marc.info/?l=bugtraq&m=103682630823080&w=2 http://marc.info/?l=ntbugtraq&m=103684360031565&w=2 http://www.iss.net/security_center/static/10582.php http://www.securityfocus.com/bid/6140 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to cause a denial of service (crash) and possibly conduct other unauthorized activities via applet tags in HTML that bypass Java class restrictions (such as private constructors) by providing the class name in the code parameter, aka "Incomplete Java Object Instantiation Vulnerability." La implementación de Java de Microsoft, como la usada en Interntet Explorer, permite a atacantes remotos causar una denegación de servicio (caída) y posiblemente llevar a cabo otras actividades no autorizadas mediante etiquetas de applets en HTML que evitan las restricciones de las clases de Java (como constructores privados) dando el nombre de la clase en parámetro del código. • http://marc.info/?l=bugtraq&m=103682630823080&w=2 http://marc.info/?l=ntbugtraq&m=103684360031565&w=2 http://www.iss.net/security_center/static/10588.php http://www.securityfocus.com/bid/6136 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-069 •

CVSS: 6.4EPSS: 1%CPEs: 1EXPL: 0

The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to read and modify the contents of the Clipboard via an applet that accesses the (1) ClipBoardGetText and (2) ClipBoardSetText methods of the INativeServices class. • http://marc.info/?l=bugtraq&m=103682630823080&w=2 http://marc.info/?l=ntbugtraq&m=103684360031565&w=2 http://www.iss.net/security_center/static/10583.php http://www.securityfocus.com/bid/6132 •

CVSS: 5.0EPSS: 81%CPEs: 1EXPL: 0

Stack-based buffer overflow in the Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to cause a denial of service via a long class name through (1) Class.forName or (2) ClassLoader.loadClass. • http://marc.info/?l=bugtraq&m=103682630823080&w=2 http://marc.info/?l=ntbugtraq&m=103684360031565&w=2 http://www.iss.net/security_center/static/10580.php http://www.securityfocus.com/bid/6134 •

CVSS: 7.5EPSS: 5%CPEs: 1EXPL: 0

The Microsoft Java implementation, as used in Internet Explorer, can provide HTML object references to applets via Javascript, which allows remote attackers to cause a denial of service (crash due to illegal memory accesses) and possibly conduct other unauthorized activities via an applet that uses those references to access proprietary Microsoft methods. • http://marc.info/?l=bugtraq&m=103682630823080&w=2 http://marc.info/?l=ntbugtraq&m=103684360031565&w=2 http://www.iss.net/security_center/static/10587.php http://www.securityfocus.com/bid/6135 •