10 results (0.005 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

The Microsoft Java implementation, as used in Internet Explorer, provides a public load0() method for the CabCracker class (com.ms.vm.loader.CabCracker), which allows remote attackers to bypass the security checks that are performed by the load() method. • http://marc.info/?l=bugtraq&m=103682630823080&w=2 http://marc.info/?l=ntbugtraq&m=103684360031565&w=2 http://www.iss.net/security_center/static/10586.php http://www.securityfocus.com/bid/6137 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

The Microsoft Java virtual machine (VM) build 5.0.3805 and earlier, as used in Internet Explorer, allows remote attackers to extend the Standard Security Manager (SSM) class (com.ms.security.StandardSecurityManager) and bypass intended StandardSecurityManager restrictions by modifying the (1) deniedDefinitionPackages or (2) deniedAccessPackages settings, causing a denial of service by adding Java applets to the list of applets that are prevented from running. • http://marc.info/?l=bugtraq&m=103682630823080&w=2 http://marc.info/?l=ntbugtraq&m=103684360031565&w=2 http://www.kb.cert.org/vuls/id/237777 http://www.securityfocus.com/bid/6133 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-069 https://exchange.xforce.ibmcloud.com/vulnerabilities/10585 •

CVSS: 5.0EPSS: 14%CPEs: 1EXPL: 0

The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to read arbitrary local files and network shares via an applet tag with a codebase set to a "file://%00" (null character) URL. • http://marc.info/?l=bugtraq&m=103682630823080&w=2 http://marc.info/?l=ntbugtraq&m=103684360031565&w=2 http://www.iss.net/security_center/static/10584.php http://www.securityfocus.com/bid/6138 •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 0

The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to determine the current directory of the Internet Explorer process via the getAbsolutePath() method in a File() call. • http://marc.info/?l=bugtraq&m=103682630823080&w=2 http://marc.info/?l=ntbugtraq&m=103684360031565&w=2 http://www.securityfocus.com/bid/6139 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to steal cookies and execute script in a different security context via a URL that contains a colon in the domain portion, which is not properly parsed and loads an applet from a malicious site within the security context of the site that is being visited by the user. La implementación de Java de Microsoft, como la usada en Internet Explorer, permite a atacantes remotos robar cookies y ejecutar script en un contexto de seguridad diferente mediante una URL que contiene una coma en la porción de dominio, que no es procesada adecuadamente y carga un applet de un sitio web malicioso en el contexto de seguridad del sitio que está siendo visitida por el usuario. • http://marc.info/?l=bugtraq&m=103682630823080&w=2 http://marc.info/?l=ntbugtraq&m=103684360031565&w=2 http://www.kb.cert.org/vuls/id/657625 http://www.securityfocus.com/bid/6142 https://exchange.xforce.ibmcloud.com/vulnerabilities/10579 •