cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-37325,https://securityvulnerability.io/vulnerability/CVE-2024-37325,Elevation of Privilege Vulnerability Affects Azure Science Virtual Machine (DSVM),"The vulnerability associated with Azure Science Virtual Machine (DSVM) allows for elevation of privilege, potentially enabling unauthorized users to gain access to higher privileges than intended within the system. This can compromise security policies and expose sensitive data. Organizations utilizing DSVM should assess their security posture and apply necessary mitigations to safeguard against exploitation.",Microsoft,Azure Data Science Virtual Machines,8.1,HIGH,0.0034799999557435513,false,false,false,false,,false,false,2024-06-11T17:00:10.091Z,0 CVE-2020-16995,https://securityvulnerability.io/vulnerability/CVE-2020-16995,Network Watcher Agent Virtual Machine Extension for Linux Elevation of Privilege Vulnerability,"
An elevation of privilege vulnerability exists in Network Watcher Agent virtual machine extension for Linux. An attacker who successfully exploited this vulnerability could execute code with elevated privileges.
To exploit this vulnerability, an attacker would have to be present as a user on the affected virtual machine.
The security update addresses this vulnerability by correcting how Network Watcher Agent virtual machine extension for Linux executes with elevated privileges.
",Microsoft,Network Watcher Agent Virtual Machine Extension For Linux,7.8,HIGH,0.0006699999794363976,false,false,false,false,,false,false,2020-10-16T23:15:00.000Z,0 CVE-2015-0012,https://securityvulnerability.io/vulnerability/CVE-2015-0012,,"Microsoft System Center Virtual Machine Manager (VMM) 2012 R2 Update Rollup 4 does not properly validate the roles of users, which allows local users to obtain server and virtual-machine administrative privileges by establishing a server session with Active Directory credentials, aka ""Virtual Machine Manager Elevation of Privilege Vulnerability.""",Microsoft,Virtual Machine Manager,,,0.005679999943822622,false,false,false,false,,false,false,2015-02-11T02:00:00.000Z,0 CVE-2004-0723,https://securityvulnerability.io/vulnerability/CVE-2004-0723,,"Microsoft Java virtual machine (VM) 5.0.0.3810 allows remote attackers to bypass sandbox restrictions to read or write certain data between applets from different domains via the ""GET/Key"" and ""PUT/Key/Value"" commands, aka ""cross-site Java.""",Microsoft,Java Virtual Machine,,,0.003470000112429261,false,false,false,false,,false,false,2004-07-27T04:00:00.000Z,0 CVE-2003-0111,https://securityvulnerability.io/vulnerability/CVE-2003-0111,,"The ByteCode Verifier component of Microsoft Virtual Machine (VM) build 5.0.3809 and earlier, as used in Windows and Internet Explorer, allows remote attackers to bypass security checks and execute arbitrary code via a malicious Java applet, aka ""Flaw in Microsoft VM Could Enable System Compromise.""",Microsoft,Virtual Machine,,,0.16944000124931335,false,false,false,false,,false,false,2003-05-05T04:00:00.000Z,0 CVE-2002-1293,https://securityvulnerability.io/vulnerability/CVE-2002-1293,,"The Microsoft Java implementation, as used in Internet Explorer, provides a public load0() method for the CabCracker class (com.ms.vm.loader.CabCracker), which allows remote attackers to bypass the security checks that are performed by the load() method.",Microsoft,Java Virtual Machine,,,0.01522000040858984,false,false,false,false,,false,false,2002-11-29T05:00:00.000Z,0 CVE-2002-1295,https://securityvulnerability.io/vulnerability/CVE-2002-1295,,"The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to cause a denial of service (crash) and possibly conduct other unauthorized activities via applet tags in HTML that bypass Java class restrictions (such as private constructors) by providing the class name in the code parameter, aka ""Incomplete Java Object Instantiation Vulnerability.""",Microsoft,Java Virtual Machine,,,0.004840000066906214,false,false,false,false,,false,false,2002-11-29T05:00:00.000Z,0 CVE-2002-1289,https://securityvulnerability.io/vulnerability/CVE-2002-1289,,"The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to read restricted process memory, cause a denial of service (crash), and possibly execute arbitrary code via the getNativeServices function, which creates an instance of the com.ms.awt.peer.INativeServices (INativeServices) class, whose methods do not verify the memory addresses that are passed as parameters.",Microsoft,Java Virtual Machine,,,0.044920001178979874,false,false,false,false,,false,false,2002-11-29T05:00:00.000Z,0 CVE-2002-1290,https://securityvulnerability.io/vulnerability/CVE-2002-1290,,"The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to read and modify the contents of the Clipboard via an applet that accesses the (1) ClipBoardGetText and (2) ClipBoardSetText methods of the INativeServices class.",Microsoft,Java Virtual Machine,,,0.01696000061929226,false,false,false,false,,false,false,2002-11-29T05:00:00.000Z,0 CVE-2002-1294,https://securityvulnerability.io/vulnerability/CVE-2002-1294,,"The Microsoft Java implementation, as used in Internet Explorer, can provide HTML object references to applets via Javascript, which allows remote attackers to cause a denial of service (crash due to illegal memory accesses) and possibly conduct other unauthorized activities via an applet that uses those references to access proprietary Microsoft methods.",Microsoft,Java Virtual Machine,,,0.053369998931884766,false,false,false,false,,false,false,2002-11-29T05:00:00.000Z,0 CVE-2002-1291,https://securityvulnerability.io/vulnerability/CVE-2002-1291,,"The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to read arbitrary local files and network shares via an applet tag with a codebase set to a ""file://%00"" (null character) URL.",Microsoft,Java Virtual Machine,,,0.1433199942111969,false,false,false,false,,false,false,2002-11-29T05:00:00.000Z,0 CVE-2002-1287,https://securityvulnerability.io/vulnerability/CVE-2002-1287,,"Stack-based buffer overflow in the Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to cause a denial of service via a long class name through (1) Class.forName or (2) ClassLoader.loadClass.",Microsoft,Java Virtual Machine,,,0.8114799857139587,false,false,false,false,,false,false,2002-11-29T05:00:00.000Z,0 CVE-2002-1292,https://securityvulnerability.io/vulnerability/CVE-2002-1292,,"The Microsoft Java virtual machine (VM) build 5.0.3805 and earlier, as used in Internet Explorer, allows remote attackers to extend the Standard Security Manager (SSM) class (com.ms.security.StandardSecurityManager) and bypass intended StandardSecurityManager restrictions by modifying the (1) deniedDefinitionPackages or (2) deniedAccessPackages settings, causing a denial of service by adding Java applets to the list of applets that are prevented from running.",Microsoft,Java Virtual Machine,,,0.01582000032067299,false,false,false,false,,false,false,2002-11-29T05:00:00.000Z,0 CVE-2002-1286,https://securityvulnerability.io/vulnerability/CVE-2002-1286,,"The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to steal cookies and execute script in a different security context via a URL that contains a colon in the domain portion, which is not properly parsed and loads an applet from a malicious site within the security context of the site that is being visited by the user.",Microsoft,Java Virtual Machine,,,0.015250000171363354,false,false,false,false,,false,false,2002-11-29T05:00:00.000Z,0 CVE-2002-1288,https://securityvulnerability.io/vulnerability/CVE-2002-1288,,"The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to determine the current directory of the Internet Explorer process via the getAbsolutePath() method in a File() call.",Microsoft,Java Virtual Machine,,,0.03734000027179718,false,false,false,false,,false,false,2002-11-29T05:00:00.000Z,0 CVE-2002-0866,https://securityvulnerability.io/vulnerability/CVE-2002-0866,,"Java Database Connectivity (JDBC) classes in Microsoft Virtual Machine (VM) up to and including 5.0.3805 allow remote attackers to load and execute DLLs (dynamic link libraries) via a Java applet that calls the constructor for com.ms.jdbc.odbc.JdbcOdbc with the desired DLL terminated by a null string, aka ""DLL Execution via JDBC Classes.""",Microsoft,Virtual Machine,,,0.4661499857902527,false,false,false,false,,false,false,2002-10-11T04:00:00.000Z,0 CVE-2002-0867,https://securityvulnerability.io/vulnerability/CVE-2002-0867,,"Microsoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote attackers to cause a denial of service (crash) in Internet Explorer via invalid handle data in a Java applet, aka ""Handle Validation Flaw.""",Microsoft,Virtual Machine,,,0.022630000486969948,false,false,false,false,,false,false,2002-10-11T04:00:00.000Z,0 CVE-2002-0865,https://securityvulnerability.io/vulnerability/CVE-2002-0865,,"A certain class that supports XML (Extensible Markup Language) in Microsoft Virtual Machine (VM) 5.0.3805 and earlier, probably com.ms.osp.ospmrshl, exposes certain unsafe methods, which allows remote attackers to execute unsafe code via a Java applet, aka ""Inappropriate Methods Exposed in XML Support Classes.""",Microsoft,Virtual Machine,,,0.016340000554919243,false,false,false,false,,false,false,2002-10-11T04:00:00.000Z,0 CVE-2002-0979,https://securityvulnerability.io/vulnerability/CVE-2002-0979,,"The Java logging feature for the Java Virtual Machine in Internet Explorer writes output from functions such as System.out.println to a known pathname, which can be used to execute arbitrary code.",Microsoft,Virtual Machine,,,0.16738000512123108,false,false,false,false,,false,false,2002-09-24T04:00:00.000Z,0 CVE-2000-0132,https://securityvulnerability.io/vulnerability/CVE-2000-0132,,Microsoft Java Virtual Machine allows remote attackers to read files via the getSystemResourceAsStream function.,Microsoft,Virtual Machine,,,0.004279999993741512,false,false,false,false,,false,false,2000-01-31T05:00:00.000Z,0 CVE-1999-0766,https://securityvulnerability.io/vulnerability/CVE-1999-0766,,The Microsoft Java Virtual Machine allows a malicious Java applet to execute arbitrary commands outside of the sandbox environment.,Microsoft,Java Virtual Machine,,,0.008080000057816505,false,false,false,false,,false,false,1999-10-21T04:00:00.000Z,0 CVE-2000-0327,https://securityvulnerability.io/vulnerability/CVE-2000-0327,,"Microsoft Virtual Machine (VM) allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, aka the ""Virtual Machine Verifier"" vulnerability.",Microsoft,Virtual Machine,,,0.0029800001066178083,false,false,false,false,,false,false,1999-10-21T04:00:00.000Z,0