2024-12-08 03:06:42 +00:00

157 lines
5.0 KiB
JSON

{
"id": "CVE-2002-0865",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-10-11T04:00:00.000",
"lastModified": "2024-11-20T23:40:03.793",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A certain class that supports XML (Extensible Markup Language) in Microsoft Virtual Machine (VM) 5.0.3805 and earlier, probably com.ms.osp.ospmrshl, exposes certain unsafe methods, which allows remote attackers to execute unsafe code via a Java applet, aka \"Inappropriate Methods Exposed in XML Support Classes.\""
},
{
"lang": "es",
"value": "Una clase que soporta XML (Lenguaje de Marcas eXtensible) en Microsoft Virtual Machine (VM) 5.0.3805 y anteriores expone cierto m\u00e9todos inseguros, que permiten a atacantes remotos ejecutar c\u00f3digo inseguro mediante un applet de Java. Tambi\u00e9n conocida como \"M\u00e9todos inapropiados expuestos en clases de soporte XML\""
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": true,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:virtual_machine:2000:*:*:*:*:*:*:*",
"matchCriteriaId": "A299BA2B-FD34-4FD5-8A4B-EA99DA9BA3EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:virtual_machine:3000:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2655D3-B360-4F82-B9CE-EECC95E0FAEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:virtual_machine:3100:*:*:*:*:*:*:*",
"matchCriteriaId": "CB67AEF8-DD02-4F20-B920-AC0B26D47C98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:virtual_machine:3188:*:*:*:*:*:*:*",
"matchCriteriaId": "B798772D-183C-4EE8-8E78-E37CCEC35B43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:virtual_machine:3200:*:*:*:*:*:*:*",
"matchCriteriaId": "D133B730-EEDA-46E7-8CC4-4D0104D65C11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:virtual_machine:3300:*:*:*:*:*:*:*",
"matchCriteriaId": "962D0B64-8EEE-4589-84B3-D504906AEEC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:virtual_machine:3802:*:*:*:*:*:*:*",
"matchCriteriaId": "FB10F6CD-E12B-469B-8634-2185172D97D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:virtual_machine:3805:*:*:*:*:*:*:*",
"matchCriteriaId": "FBBEEAFB-9087-40C0-85A8-AAC82F6CD6D1"
}
]
}
]
}
],
"references": [
{
"url": "http://www.iss.net/security_center/static/10135.php",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/140898",
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/5752",
"source": "cve@mitre.org"
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052",
"source": "cve@mitre.org"
},
{
"url": "http://www.iss.net/security_center/static/10135.php",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.kb.cert.org/vuls/id/140898",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
]
},
{
"url": "http://www.securityfocus.com/bid/5752",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-052",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}