Stack-based Buffer Overflow in Microsoft Java Implementation in Internet Explorer
CVE-2002-1287
Currently unrated
Summary
A stack-based buffer overflow in the Microsoft Java implementation used in Internet Explorer allows remote attackers to exploit this vulnerability by sending a specially crafted long class name through Class.forName or ClassLoader.loadClass. This could lead to unexpected behavior and potential denial of service, making it critical for users to ensure their systems are up-to-date and secure against this type of attack.
References
EPSS Score
6% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved