CVE-2003-1123 (GCVE-0-2003-1123)

Vulnerability from cvelistv5 – Published: 2005-03-12 05:00 – Updated: 2024-08-08 02:19
VLAI?
Summary
Sun Java Runtime Environment (JRE) and SDK 1.4.0_01 and earlier allows untrusted applets to access certain information within trusted applets, which allows attackers to bypass the restrictions of the Java security model.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://www.kb.cert.org/vuls/id/393292 third-party-advisoryx_refsource_CERT-VN
http://www.securityfocus.com/bid/7824 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/8958 third-party-advisoryx_refsource_SECUNIA
http://securitytracker.com/id?1006935 vdb-entryx_refsource_SECTRACK
Date Public ?
2003-06-04 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:19:44.736Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "55100",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-55100-1"
          },
          {
            "name": "VU#393292",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/393292"
          },
          {
            "name": "7824",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/7824"
          },
          {
            "name": "sun-applet-access-information(12189)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12189"
          },
          {
            "name": "8958",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/8958"
          },
          {
            "name": "1006935",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1006935"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-06-04T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sun Java Runtime Environment (JRE) and SDK 1.4.0_01 and earlier allows untrusted applets to access certain information within trusted applets, which allows attackers to bypass the restrictions of the Java security model."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "55100",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-55100-1"
        },
        {
          "name": "VU#393292",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/393292"
        },
        {
          "name": "7824",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/7824"
        },
        {
          "name": "sun-applet-access-information(12189)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12189"
        },
        {
          "name": "8958",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/8958"
        },
        {
          "name": "1006935",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1006935"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-1123",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sun Java Runtime Environment (JRE) and SDK 1.4.0_01 and earlier allows untrusted applets to access certain information within trusted applets, which allows attackers to bypass the restrictions of the Java security model."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "55100",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-55100-1"
            },
            {
              "name": "VU#393292",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/393292"
            },
            {
              "name": "7824",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/7824"
            },
            {
              "name": "sun-applet-access-information(12189)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12189"
            },
            {
              "name": "8958",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/8958"
            },
            {
              "name": "1006935",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1006935"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-1123",
    "datePublished": "2005-03-12T05:00:00.000Z",
    "dateReserved": "2005-03-11T00:00:00.000Z",
    "dateUpdated": "2024-08-08T02:19:44.736Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2003-1123",
      "date": "2026-04-24",
      "epss": "0.08589",
      "percentile": "0.92433"
    },
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.2.2:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"BF9F20E7-1F56-4AC5-B7BD-D89F747ADA49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.2.2_10:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"6DC38733-9993-4C0D-89D0-2BB6F84EBA0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.2.2_10:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"F4415B3B-0E1D-44DE-989D-FB2C01B65411\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.2.2_10:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"595E6E1C-F3AC-4F0C-B252-A99F098E3568\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.2.2_11:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"D8CDFEC3-430A-4ADC-9A8E-ED17C3BB24E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.2.2_11:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"3FEF965F-681D-49C8-9ACA-9023E5948822\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.2.2_11:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"65D508F2-9305-4170-8AB4-F31310D042AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.2.2_12:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"4FE9176F-13BA-42DA-ACD6-0FD5F23CD365\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"D66D2BCE-FAF5-4F88-A09F-28226C4A98D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.0_02:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"74D5059B-CF4F-4EEE-99B4-B3052831F2A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.0_02:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"633A6610-1537-480A-90F5-72234612FDC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.0_02:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"1F601DB9-596C-4922-AAA1-601B7DF82AF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.0_05:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"6D7E0A15-F9F8-4FE0-99DC-C7F1C4C607DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.0_05:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"EFAB22EE-C8E3-46D1-8231-6E0143502401\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.0_05:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"2E525A70-8256-4BE9-B9F2-CB4F0005C285\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.1_01:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"7914F3C3-70D2-4528-8781-74F8EE2A672F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.1_01:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"C25FD66C-2B23-4A08-95A9-C026B6C7B334\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.1_01a:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"4EE03D61-ED9C-4E5A-8B8A-B9DE6D953A59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.1_03:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"91C7D131-506C-4AEC-A736-0E4D4C6DFED7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.1_03:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"38B09D0A-D9E1-440C-9111-5E04D983F687\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.1_03:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"7C3BD547-71C6-4A69-9F98-AD082595B6C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.1_04:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"66EE3DB6-55B2-44D6-AE20-D6F68294E2DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.4:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"32CA2101-45D2-41D8-A11A-506683EDC0DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.4:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"2E449C78-3BFD-4F52-9EE2-3BC5FC27FBCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.4:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"3C4BAD5A-329C-4C6F-B517-E7C95EEAEB99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.4.0_01:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"64762803-D970-467D-A3B7-1879BC68E805\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"91FC20D9-8B93-4086-808E-227B20887B9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"B3075AD4-3C8C-49EA-814E-45C16E9003DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2:update10:linux:*:*:*:*:*\", \"matchCriteriaId\": \"EB1F86CE-B6A3-45A5-BEF6-2BEDD607F6EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2:update10:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"8D18518C-C3B2-4021-8710-928AFB1C0B1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2:update10:windows:*:*:*:*:*\", \"matchCriteriaId\": \"AF7229C2-FEE6-47F1-A2F9-2209D15EC4BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2_003:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"C60BC1CB-A8D0-4DEB-AC24-3266FBF482F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2_011:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"6B33DE56-CF29-4AC8-9EA5-B67BE218A8B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2_011:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"81785A26-F85C-4D91-962D-C1EFD08BE145\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2_011:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"0AD207B4-FDAC-494D-8072-6CA4ED0F2959\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2_012:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"E4E705CA-394C-4D33-9BBB-A8FAFDB8A444\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"C80967B2-546E-4C20-8B0D-2B9BA0D5FE0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"36C3E5A4-7B4E-4DA3-A3B2-33ED7FDB7B0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"58EC15B8-4653-490D-8F3A-5AA5CDBA1DB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:update2:linux:*:*:*:*:*\", \"matchCriteriaId\": \"6B3248A9-A42D-47D7-9EF6-A68BB3F55096\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:update2:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"5F54BFB9-ACE4-4C70-9D5E-C964A37B49D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:update2:windows:*:*:*:*:*\", \"matchCriteriaId\": \"F2255FF1-CD7F-416E-82CE-727A0D9B9B00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:update4:windows:*:*:*:*:*\", \"matchCriteriaId\": \"6136361A-10B4-4DF0-A5E1-1A0E68008BFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:update5:linux:*:*:*:*:*\", \"matchCriteriaId\": \"6ED3AE5C-F50B-4ABE-AD92-D6F91E6F1D6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:update5:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"DD448EDD-02A6-4902-8003-2C24490CDDEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:update5:windows:*:*:*:*:*\", \"matchCriteriaId\": \"6668C814-CF6F-4684-B84E-F0E24C318677\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.1:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"AB5A6F28-5B2E-4020-AC22-5FF1AB5DC0F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.1:update1:linux:*:*:*:*:*\", \"matchCriteriaId\": \"2458734D-2871-4104-B791-F12218A65CA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.1:update1:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"CEB5308E-DFBE-4038-A618-F5448E7B590D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.1:update1:windows:*:*:*:*:*\", \"matchCriteriaId\": \"BF2F0F47-CB18-41EC-9500-9BCCBBF0055F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.1:update4:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"C16614FE-919F-4141-A6F0-8E8F5D79FFDF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.1:update4:windows:*:*:*:*:*\", \"matchCriteriaId\": \"6E75D769-12E0-47BD-AE43-4149F98371C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.1_03:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"C1C8FAED-AD0F-4B28-A5EF-DBD6514D60CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.1_03:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"16C38B5F-673D-47F2-87C6-59B2CBF917BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.1_03:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"78916851-B219-4E06-A35F-EAF3680A8F75\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.4:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"16EB847E-C18B-4B07-940D-C0E312D11365\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.4:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"68727223-1523-467A-8AAA-ED3E4C6C4B61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.4:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"682E551B-7B86-4161-84D5-6E1D9664A2A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.4.0_01:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"282FD7B0-6D3B-45A1-B717-15FB7A8128EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.4.0_01:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"09F85CA0-99C0-489D-BFF7-45D97C9DFC09\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Sun Java Runtime Environment (JRE) and SDK 1.4.0_01 and earlier allows untrusted applets to access certain information within trusted applets, which allows attackers to bypass the restrictions of the Java security model.\"}]",
      "id": "CVE-2003-1123",
      "lastModified": "2024-11-20T23:46:24.457",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": true, \"userInteractionRequired\": false}]}",
      "published": "2003-12-31T05:00:00.000",
      "references": "[{\"url\": \"http://secunia.com/advisories/8958\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securitytracker.com/id?1006935\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-55100-1\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/393292\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.securityfocus.com/bid/7824\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/12189\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/8958\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1006935\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-55100-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/393292\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.securityfocus.com/bid/7824\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/12189\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2003-1123\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2003-12-31T05:00:00.000\",\"lastModified\":\"2026-04-16T00:27:16.627\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Sun Java Runtime Environment (JRE) and SDK 1.4.0_01 and earlier allows untrusted applets to access certain information within trusted applets, which allows attackers to bypass the restrictions of the Java security model.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.2.2:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"BF9F20E7-1F56-4AC5-B7BD-D89F747ADA49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.2.2_10:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"6DC38733-9993-4C0D-89D0-2BB6F84EBA0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.2.2_10:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"F4415B3B-0E1D-44DE-989D-FB2C01B65411\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.2.2_10:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"595E6E1C-F3AC-4F0C-B252-A99F098E3568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.2.2_11:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"D8CDFEC3-430A-4ADC-9A8E-ED17C3BB24E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.2.2_11:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"3FEF965F-681D-49C8-9ACA-9023E5948822\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.2.2_11:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"65D508F2-9305-4170-8AB4-F31310D042AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.2.2_12:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"4FE9176F-13BA-42DA-ACD6-0FD5F23CD365\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"D66D2BCE-FAF5-4F88-A09F-28226C4A98D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.0_02:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"74D5059B-CF4F-4EEE-99B4-B3052831F2A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.0_02:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"633A6610-1537-480A-90F5-72234612FDC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.0_02:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"1F601DB9-596C-4922-AAA1-601B7DF82AF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.0_05:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"6D7E0A15-F9F8-4FE0-99DC-C7F1C4C607DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.0_05:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"EFAB22EE-C8E3-46D1-8231-6E0143502401\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.0_05:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"2E525A70-8256-4BE9-B9F2-CB4F0005C285\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.1_01:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"7914F3C3-70D2-4528-8781-74F8EE2A672F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.1_01:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"C25FD66C-2B23-4A08-95A9-C026B6C7B334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.1_01a:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"4EE03D61-ED9C-4E5A-8B8A-B9DE6D953A59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.1_03:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"91C7D131-506C-4AEC-A736-0E4D4C6DFED7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.1_03:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"38B09D0A-D9E1-440C-9111-5E04D983F687\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.1_03:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"7C3BD547-71C6-4A69-9F98-AD082595B6C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.1_04:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"66EE3DB6-55B2-44D6-AE20-D6F68294E2DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.4:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"32CA2101-45D2-41D8-A11A-506683EDC0DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.4:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"2E449C78-3BFD-4F52-9EE2-3BC5FC27FBCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.4:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"3C4BAD5A-329C-4C6F-B517-E7C95EEAEB99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.4.0_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"64762803-D970-467D-A3B7-1879BC68E805\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"91FC20D9-8B93-4086-808E-227B20887B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"B3075AD4-3C8C-49EA-814E-45C16E9003DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2:update10:linux:*:*:*:*:*\",\"matchCriteriaId\":\"EB1F86CE-B6A3-45A5-BEF6-2BEDD607F6EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2:update10:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"8D18518C-C3B2-4021-8710-928AFB1C0B1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2:update10:windows:*:*:*:*:*\",\"matchCriteriaId\":\"AF7229C2-FEE6-47F1-A2F9-2209D15EC4BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2_003:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"C60BC1CB-A8D0-4DEB-AC24-3266FBF482F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2_011:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"6B33DE56-CF29-4AC8-9EA5-B67BE218A8B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2_011:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"81785A26-F85C-4D91-962D-C1EFD08BE145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2_011:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"0AD207B4-FDAC-494D-8072-6CA4ED0F2959\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2_012:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"E4E705CA-394C-4D33-9BBB-A8FAFDB8A444\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"C80967B2-546E-4C20-8B0D-2B9BA0D5FE0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"36C3E5A4-7B4E-4DA3-A3B2-33ED7FDB7B0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"58EC15B8-4653-490D-8F3A-5AA5CDBA1DB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:update2:linux:*:*:*:*:*\",\"matchCriteriaId\":\"6B3248A9-A42D-47D7-9EF6-A68BB3F55096\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:update2:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"5F54BFB9-ACE4-4C70-9D5E-C964A37B49D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:update2:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F2255FF1-CD7F-416E-82CE-727A0D9B9B00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:update4:windows:*:*:*:*:*\",\"matchCriteriaId\":\"6136361A-10B4-4DF0-A5E1-1A0E68008BFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:update5:linux:*:*:*:*:*\",\"matchCriteriaId\":\"6ED3AE5C-F50B-4ABE-AD92-D6F91E6F1D6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:update5:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"DD448EDD-02A6-4902-8003-2C24490CDDEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:update5:windows:*:*:*:*:*\",\"matchCriteriaId\":\"6668C814-CF6F-4684-B84E-F0E24C318677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.1:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"AB5A6F28-5B2E-4020-AC22-5FF1AB5DC0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.1:update1:linux:*:*:*:*:*\",\"matchCriteriaId\":\"2458734D-2871-4104-B791-F12218A65CA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.1:update1:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"CEB5308E-DFBE-4038-A618-F5448E7B590D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.1:update1:windows:*:*:*:*:*\",\"matchCriteriaId\":\"BF2F0F47-CB18-41EC-9500-9BCCBBF0055F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.1:update4:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"C16614FE-919F-4141-A6F0-8E8F5D79FFDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.1:update4:windows:*:*:*:*:*\",\"matchCriteriaId\":\"6E75D769-12E0-47BD-AE43-4149F98371C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.1_03:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"C1C8FAED-AD0F-4B28-A5EF-DBD6514D60CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.1_03:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"16C38B5F-673D-47F2-87C6-59B2CBF917BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.1_03:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"78916851-B219-4E06-A35F-EAF3680A8F75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"16EB847E-C18B-4B07-940D-C0E312D11365\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"68727223-1523-467A-8AAA-ED3E4C6C4B61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"682E551B-7B86-4161-84D5-6E1D9664A2A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.0_01:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"282FD7B0-6D3B-45A1-B717-15FB7A8128EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.0_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"09F85CA0-99C0-489D-BFF7-45D97C9DFC09\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/8958\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1006935\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-55100-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/393292\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/7824\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/12189\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/8958\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1006935\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-55100-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/393292\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/7824\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/12189\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…