CVE-2003-0111 – Microsoft Java Virtual Machine 3802 Series - Bytecode Verifier
https://notcve.org/view.php?id=CVE-2003-0111
The ByteCode Verifier component of Microsoft Virtual Machine (VM) build 5.0.3809 and earlier, as used in Windows and Internet Explorer, allows remote attackers to bypass security checks and execute arbitrary code via a malicious Java applet, aka "Flaw in Microsoft VM Could Enable System Compromise." El componente Verificador de ByteCode de la Máquina Virtual (VW) de Microsoft compilación 5.0.3809 y anteriores, usada en en Windows y en Internet Explorer, permite a atacantes remotos eludir comprobaciones de seguridad y ejecutar código arbitrario mediante un applet de Java malicioso, también conocido como "Fallo en Microsoft VW Podría Permitir Compromiso del Sistema" • https://www.exploit-db.com/exploits/22027 http://www.iss.net/security_center/static/11751.php http://www.kb.cert.org/vuls/id/447569 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-011 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A136 •
CVE-2002-1293
https://notcve.org/view.php?id=CVE-2002-1293
The Microsoft Java implementation, as used in Internet Explorer, provides a public load0() method for the CabCracker class (com.ms.vm.loader.CabCracker), which allows remote attackers to bypass the security checks that are performed by the load() method. • http://marc.info/?l=bugtraq&m=103682630823080&w=2 http://marc.info/?l=ntbugtraq&m=103684360031565&w=2 http://www.iss.net/security_center/static/10586.php http://www.securityfocus.com/bid/6137 •
CVE-2002-1292
https://notcve.org/view.php?id=CVE-2002-1292
The Microsoft Java virtual machine (VM) build 5.0.3805 and earlier, as used in Internet Explorer, allows remote attackers to extend the Standard Security Manager (SSM) class (com.ms.security.StandardSecurityManager) and bypass intended StandardSecurityManager restrictions by modifying the (1) deniedDefinitionPackages or (2) deniedAccessPackages settings, causing a denial of service by adding Java applets to the list of applets that are prevented from running. • http://marc.info/?l=bugtraq&m=103682630823080&w=2 http://marc.info/?l=ntbugtraq&m=103684360031565&w=2 http://www.kb.cert.org/vuls/id/237777 http://www.securityfocus.com/bid/6133 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-069 https://exchange.xforce.ibmcloud.com/vulnerabilities/10585 •
CVE-2002-1291
https://notcve.org/view.php?id=CVE-2002-1291
The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to read arbitrary local files and network shares via an applet tag with a codebase set to a "file://%00" (null character) URL. • http://marc.info/?l=bugtraq&m=103682630823080&w=2 http://marc.info/?l=ntbugtraq&m=103684360031565&w=2 http://www.iss.net/security_center/static/10584.php http://www.securityfocus.com/bid/6138 •
CVE-2002-1288
https://notcve.org/view.php?id=CVE-2002-1288
The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to determine the current directory of the Internet Explorer process via the getAbsolutePath() method in a File() call. • http://marc.info/?l=bugtraq&m=103682630823080&w=2 http://marc.info/?l=ntbugtraq&m=103684360031565&w=2 http://www.securityfocus.com/bid/6139 •