Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
2002-11-29 CVE-2002-1310 Buffer Overrun vulnerability in Macromedia JRun IIS ISAPI Filter GET Request
Heap-based buffer overflow in the error-handling mechanism for the IIS ISAPI handler in Macromedia JRun 4.0 and earlier allows remote attackers to execute arbitrary via an HTTP GET request with a long .jsp file name.
network
low complexity
macromedia
7.5
2002-11-29 CVE-2002-1309 Remote Security vulnerability in Macromedia Coldfusion 6.0
Heap-based buffer overflow in the error-handling mechanism for the IIS ISAPI handler in Macromedia ColdFusion 6.0 allows remote attackers to execute arbitrary via an HTTP GET request with a long .cfm file name.
network
low complexity
macromedia
7.5
2002-11-29 CVE-2002-1308 Remote Heap Corruption vulnerability in Netscape/Mozilla JAR
Heap-based buffer overflow in Netscape and Mozilla allows remote attackers to execute arbitrary code via a jar: URL that references a malformed .jar file, which overflows a buffer during decompression.
network
low complexity
mozilla netscape
7.5
2002-11-29 CVE-2002-1306 Remote Security vulnerability in Kde
Multiple buffer overflows in LISa on KDE 2.x for 2.1 and later, and KDE 3.x before 3.0.4, allow (1) local and possibly remote attackers to execute arbitrary code via the "lisa" daemon, and (2) remote attackers to execute arbitrary code via a certain "lan://" URL.
network
low complexity
kde
7.5
2002-11-29 CVE-2002-1295 Unspecified vulnerability in Microsoft Java Virtual Machine 1.1
The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to cause a denial of service (crash) and possibly conduct other unauthorized activities via applet tags in HTML that bypass Java class restrictions (such as private constructors) by providing the class name in the code parameter, aka "Incomplete Java Object Instantiation Vulnerability."
network
low complexity
microsoft
7.5
2002-11-29 CVE-2002-1294 Denial Of Service vulnerability in Microsoft Java Virtual Machine 1.1
The Microsoft Java implementation, as used in Internet Explorer, can provide HTML object references to applets via Javascript, which allows remote attackers to cause a denial of service (crash due to illegal memory accesses) and possibly conduct other unauthorized activities via an applet that uses those references to access proprietary Microsoft methods.
network
low complexity
microsoft
7.5
2002-11-29 CVE-2002-1293 Unspecified vulnerability in Microsoft Java Virtual Machine 1.1
The Microsoft Java implementation, as used in Internet Explorer, provides a public load0() method for the CabCracker class (com.ms.vm.loader.CabCracker), which allows remote attackers to bypass the security checks that are performed by the load() method.
network
low complexity
microsoft
7.5
2002-11-29 CVE-2002-1292 Unspecified vulnerability in Microsoft Java Virtual Machine 1.1
The Microsoft Java virtual machine (VM) build 5.0.3805 and earlier, as used in Internet Explorer, allows remote attackers to extend the Standard Security Manager (SSM) class (com.ms.security.StandardSecurityManager) and bypass intended StandardSecurityManager restrictions by modifying the (1) deniedDefinitionPackages or (2) deniedAccessPackages settings, causing a denial of service by adding Java applets to the list of applets that are prevented from running.
network
low complexity
microsoft
7.5
2002-11-29 CVE-2002-1289 Unspecified vulnerability in Microsoft Java Virtual Machine 1.1
The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to read restricted process memory, cause a denial of service (crash), and possibly execute arbitrary code via the getNativeServices function, which creates an instance of the com.ms.awt.peer.INativeServices (INativeServices) class, whose methods do not verify the memory addresses that are passed as parameters.
network
low complexity
microsoft
7.5
2002-11-29 CVE-2002-1286 Unspecified vulnerability in Microsoft Java Virtual Machine 1.1
The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to steal cookies and execute script in a different security context via a URL that contains a colon in the domain portion, which is not properly parsed and loads an applet from a malicious site within the security context of the site that is being visited by the user.
network
low complexity
microsoft
7.5