The Microsoft Java implementation, as used in Internet Explorer, provides a public load0() method for the CabCracker class (com.ms.vm.loader.CabCracker), which allows remote attackers to bypass the security checks that are performed by the load() method.
References
Configurations
History
20 Nov 2024, 23:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=103682630823080&w=2 - | |
References | () http://marc.info/?l=ntbugtraq&m=103684360031565&w=2 - | |
References | () http://www.iss.net/security_center/static/10586.php - | |
References | () http://www.securityfocus.com/bid/6137 - |
Information
Published : 2002-11-29 05:00
Updated : 2024-11-20 23:40
NVD link : CVE-2002-1293
Mitre link : CVE-2002-1293
CVE.ORG link : CVE-2002-1293
JSON object : View
Products Affected
microsoft
- java_virtual_machine
CWE