The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to cause a denial of service (crash) and possibly conduct other unauthorized activities via applet tags in HTML that bypass Java class restrictions (such as private constructors) by providing the class name in the code parameter, aka "Incomplete Java Object Instantiation Vulnerability."
References
Configurations
History
20 Nov 2024, 23:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=103682630823080&w=2 - | |
References | () http://marc.info/?l=ntbugtraq&m=103684360031565&w=2 - | |
References | () http://www.iss.net/security_center/static/10588.php - | |
References | () http://www.securityfocus.com/bid/6136 - | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-069 - |
Information
Published : 2002-11-29 05:00
Updated : 2024-11-20 23:40
NVD link : CVE-2002-1295
Mitre link : CVE-2002-1295
CVE.ORG link : CVE-2002-1295
JSON object : View
Products Affected
microsoft
- java_virtual_machine
CWE