CVE-2003-1123 (GCVE-0-2003-1123)
Vulnerability from cvelistv5 – Published: 2005-03-12 05:00 – Updated: 2024-08-08 02:19
VLAI?
Summary
Sun Java Runtime Environment (JRE) and SDK 1.4.0_01 and earlier allows untrusted applets to access certain information within trusted applets, which allows attackers to bypass the restrictions of the Java security model.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Date Public ?
2003-06-04 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:19:44.736Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "55100",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-55100-1"
},
{
"name": "VU#393292",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/393292"
},
{
"name": "7824",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/7824"
},
{
"name": "sun-applet-access-information(12189)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12189"
},
{
"name": "8958",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/8958"
},
{
"name": "1006935",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1006935"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2003-06-04T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Sun Java Runtime Environment (JRE) and SDK 1.4.0_01 and earlier allows untrusted applets to access certain information within trusted applets, which allows attackers to bypass the restrictions of the Java security model."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "55100",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-55100-1"
},
{
"name": "VU#393292",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/393292"
},
{
"name": "7824",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/7824"
},
{
"name": "sun-applet-access-information(12189)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12189"
},
{
"name": "8958",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/8958"
},
{
"name": "1006935",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1006935"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2003-1123",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Sun Java Runtime Environment (JRE) and SDK 1.4.0_01 and earlier allows untrusted applets to access certain information within trusted applets, which allows attackers to bypass the restrictions of the Java security model."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "55100",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-55100-1"
},
{
"name": "VU#393292",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/393292"
},
{
"name": "7824",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/7824"
},
{
"name": "sun-applet-access-information(12189)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/12189"
},
{
"name": "8958",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/8958"
},
{
"name": "1006935",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1006935"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2003-1123",
"datePublished": "2005-03-12T05:00:00.000Z",
"dateReserved": "2005-03-11T00:00:00.000Z",
"dateUpdated": "2024-08-08T02:19:44.736Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2003-1123",
"date": "2026-04-24",
"epss": "0.08589",
"percentile": "0.92433"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.2.2:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"BF9F20E7-1F56-4AC5-B7BD-D89F747ADA49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.2.2_10:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"6DC38733-9993-4C0D-89D0-2BB6F84EBA0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.2.2_10:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"F4415B3B-0E1D-44DE-989D-FB2C01B65411\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.2.2_10:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"595E6E1C-F3AC-4F0C-B252-A99F098E3568\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.2.2_11:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"D8CDFEC3-430A-4ADC-9A8E-ED17C3BB24E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.2.2_11:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"3FEF965F-681D-49C8-9ACA-9023E5948822\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.2.2_11:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"65D508F2-9305-4170-8AB4-F31310D042AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.2.2_12:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"4FE9176F-13BA-42DA-ACD6-0FD5F23CD365\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"D66D2BCE-FAF5-4F88-A09F-28226C4A98D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.0_02:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"74D5059B-CF4F-4EEE-99B4-B3052831F2A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.0_02:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"633A6610-1537-480A-90F5-72234612FDC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.0_02:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"1F601DB9-596C-4922-AAA1-601B7DF82AF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.0_05:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"6D7E0A15-F9F8-4FE0-99DC-C7F1C4C607DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.0_05:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"EFAB22EE-C8E3-46D1-8231-6E0143502401\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.0_05:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"2E525A70-8256-4BE9-B9F2-CB4F0005C285\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.1_01:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"7914F3C3-70D2-4528-8781-74F8EE2A672F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.1_01:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"C25FD66C-2B23-4A08-95A9-C026B6C7B334\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.1_01a:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"4EE03D61-ED9C-4E5A-8B8A-B9DE6D953A59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.1_03:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"91C7D131-506C-4AEC-A736-0E4D4C6DFED7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.1_03:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"38B09D0A-D9E1-440C-9111-5E04D983F687\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.1_03:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"7C3BD547-71C6-4A69-9F98-AD082595B6C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.3.1_04:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"66EE3DB6-55B2-44D6-AE20-D6F68294E2DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.4:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"32CA2101-45D2-41D8-A11A-506683EDC0DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.4:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"2E449C78-3BFD-4F52-9EE2-3BC5FC27FBCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.4:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"3C4BAD5A-329C-4C6F-B517-E7C95EEAEB99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jdk:1.4.0_01:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"64762803-D970-467D-A3B7-1879BC68E805\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"91FC20D9-8B93-4086-808E-227B20887B9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"B3075AD4-3C8C-49EA-814E-45C16E9003DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2:update10:linux:*:*:*:*:*\", \"matchCriteriaId\": \"EB1F86CE-B6A3-45A5-BEF6-2BEDD607F6EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2:update10:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"8D18518C-C3B2-4021-8710-928AFB1C0B1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2:update10:windows:*:*:*:*:*\", \"matchCriteriaId\": \"AF7229C2-FEE6-47F1-A2F9-2209D15EC4BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2_003:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"C60BC1CB-A8D0-4DEB-AC24-3266FBF482F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2_011:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"6B33DE56-CF29-4AC8-9EA5-B67BE218A8B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2_011:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"81785A26-F85C-4D91-962D-C1EFD08BE145\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2_011:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"0AD207B4-FDAC-494D-8072-6CA4ED0F2959\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.2.2_012:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"E4E705CA-394C-4D33-9BBB-A8FAFDB8A444\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"C80967B2-546E-4C20-8B0D-2B9BA0D5FE0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"36C3E5A4-7B4E-4DA3-A3B2-33ED7FDB7B0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"58EC15B8-4653-490D-8F3A-5AA5CDBA1DB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:update2:linux:*:*:*:*:*\", \"matchCriteriaId\": \"6B3248A9-A42D-47D7-9EF6-A68BB3F55096\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:update2:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"5F54BFB9-ACE4-4C70-9D5E-C964A37B49D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:update2:windows:*:*:*:*:*\", \"matchCriteriaId\": \"F2255FF1-CD7F-416E-82CE-727A0D9B9B00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:update4:windows:*:*:*:*:*\", \"matchCriteriaId\": \"6136361A-10B4-4DF0-A5E1-1A0E68008BFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:update5:linux:*:*:*:*:*\", \"matchCriteriaId\": \"6ED3AE5C-F50B-4ABE-AD92-D6F91E6F1D6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:update5:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"DD448EDD-02A6-4902-8003-2C24490CDDEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.0:update5:windows:*:*:*:*:*\", \"matchCriteriaId\": \"6668C814-CF6F-4684-B84E-F0E24C318677\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.1:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"AB5A6F28-5B2E-4020-AC22-5FF1AB5DC0F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.1:update1:linux:*:*:*:*:*\", \"matchCriteriaId\": \"2458734D-2871-4104-B791-F12218A65CA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.1:update1:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"CEB5308E-DFBE-4038-A618-F5448E7B590D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.1:update1:windows:*:*:*:*:*\", \"matchCriteriaId\": \"BF2F0F47-CB18-41EC-9500-9BCCBBF0055F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.1:update4:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"C16614FE-919F-4141-A6F0-8E8F5D79FFDF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.1:update4:windows:*:*:*:*:*\", \"matchCriteriaId\": \"6E75D769-12E0-47BD-AE43-4149F98371C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.1_03:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"C1C8FAED-AD0F-4B28-A5EF-DBD6514D60CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.1_03:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"16C38B5F-673D-47F2-87C6-59B2CBF917BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.3.1_03:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"78916851-B219-4E06-A35F-EAF3680A8F75\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.4:*:linux:*:*:*:*:*\", \"matchCriteriaId\": \"16EB847E-C18B-4B07-940D-C0E312D11365\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.4:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"68727223-1523-467A-8AAA-ED3E4C6C4B61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.4:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"682E551B-7B86-4161-84D5-6E1D9664A2A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.4.0_01:*:solaris:*:*:*:*:*\", \"matchCriteriaId\": \"282FD7B0-6D3B-45A1-B717-15FB7A8128EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sun:jre:1.4.0_01:*:windows:*:*:*:*:*\", \"matchCriteriaId\": \"09F85CA0-99C0-489D-BFF7-45D97C9DFC09\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Sun Java Runtime Environment (JRE) and SDK 1.4.0_01 and earlier allows untrusted applets to access certain information within trusted applets, which allows attackers to bypass the restrictions of the Java security model.\"}]",
"id": "CVE-2003-1123",
"lastModified": "2024-11-20T23:46:24.457",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": true, \"userInteractionRequired\": false}]}",
"published": "2003-12-31T05:00:00.000",
"references": "[{\"url\": \"http://secunia.com/advisories/8958\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securitytracker.com/id?1006935\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-55100-1\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/393292\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.securityfocus.com/bid/7824\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/12189\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/8958\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securitytracker.com/id?1006935\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-26-55100-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/393292\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.securityfocus.com/bid/7824\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/12189\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2003-1123\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2003-12-31T05:00:00.000\",\"lastModified\":\"2026-04-16T00:27:16.627\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Sun Java Runtime Environment (JRE) and SDK 1.4.0_01 and earlier allows untrusted applets to access certain information within trusted applets, which allows attackers to bypass the restrictions of the Java security model.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.2.2:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"BF9F20E7-1F56-4AC5-B7BD-D89F747ADA49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.2.2_10:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"6DC38733-9993-4C0D-89D0-2BB6F84EBA0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.2.2_10:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"F4415B3B-0E1D-44DE-989D-FB2C01B65411\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.2.2_10:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"595E6E1C-F3AC-4F0C-B252-A99F098E3568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.2.2_11:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"D8CDFEC3-430A-4ADC-9A8E-ED17C3BB24E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.2.2_11:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"3FEF965F-681D-49C8-9ACA-9023E5948822\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.2.2_11:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"65D508F2-9305-4170-8AB4-F31310D042AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.2.2_12:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"4FE9176F-13BA-42DA-ACD6-0FD5F23CD365\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"D66D2BCE-FAF5-4F88-A09F-28226C4A98D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.0_02:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"74D5059B-CF4F-4EEE-99B4-B3052831F2A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.0_02:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"633A6610-1537-480A-90F5-72234612FDC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.0_02:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"1F601DB9-596C-4922-AAA1-601B7DF82AF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.0_05:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"6D7E0A15-F9F8-4FE0-99DC-C7F1C4C607DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.0_05:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"EFAB22EE-C8E3-46D1-8231-6E0143502401\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.0_05:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"2E525A70-8256-4BE9-B9F2-CB4F0005C285\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.1_01:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"7914F3C3-70D2-4528-8781-74F8EE2A672F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.1_01:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"C25FD66C-2B23-4A08-95A9-C026B6C7B334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.1_01a:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"4EE03D61-ED9C-4E5A-8B8A-B9DE6D953A59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.1_03:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"91C7D131-506C-4AEC-A736-0E4D4C6DFED7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.1_03:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"38B09D0A-D9E1-440C-9111-5E04D983F687\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.1_03:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"7C3BD547-71C6-4A69-9F98-AD082595B6C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.3.1_04:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"66EE3DB6-55B2-44D6-AE20-D6F68294E2DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.4:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"32CA2101-45D2-41D8-A11A-506683EDC0DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.4:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"2E449C78-3BFD-4F52-9EE2-3BC5FC27FBCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.4:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"3C4BAD5A-329C-4C6F-B517-E7C95EEAEB99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.4.0_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"64762803-D970-467D-A3B7-1879BC68E805\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"91FC20D9-8B93-4086-808E-227B20887B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"B3075AD4-3C8C-49EA-814E-45C16E9003DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2:update10:linux:*:*:*:*:*\",\"matchCriteriaId\":\"EB1F86CE-B6A3-45A5-BEF6-2BEDD607F6EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2:update10:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"8D18518C-C3B2-4021-8710-928AFB1C0B1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2:update10:windows:*:*:*:*:*\",\"matchCriteriaId\":\"AF7229C2-FEE6-47F1-A2F9-2209D15EC4BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2_003:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"C60BC1CB-A8D0-4DEB-AC24-3266FBF482F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2_011:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"6B33DE56-CF29-4AC8-9EA5-B67BE218A8B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2_011:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"81785A26-F85C-4D91-962D-C1EFD08BE145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2_011:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"0AD207B4-FDAC-494D-8072-6CA4ED0F2959\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.2.2_012:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"E4E705CA-394C-4D33-9BBB-A8FAFDB8A444\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"C80967B2-546E-4C20-8B0D-2B9BA0D5FE0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"36C3E5A4-7B4E-4DA3-A3B2-33ED7FDB7B0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"58EC15B8-4653-490D-8F3A-5AA5CDBA1DB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:update2:linux:*:*:*:*:*\",\"matchCriteriaId\":\"6B3248A9-A42D-47D7-9EF6-A68BB3F55096\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:update2:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"5F54BFB9-ACE4-4C70-9D5E-C964A37B49D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:update2:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F2255FF1-CD7F-416E-82CE-727A0D9B9B00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:update4:windows:*:*:*:*:*\",\"matchCriteriaId\":\"6136361A-10B4-4DF0-A5E1-1A0E68008BFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:update5:linux:*:*:*:*:*\",\"matchCriteriaId\":\"6ED3AE5C-F50B-4ABE-AD92-D6F91E6F1D6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:update5:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"DD448EDD-02A6-4902-8003-2C24490CDDEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.0:update5:windows:*:*:*:*:*\",\"matchCriteriaId\":\"6668C814-CF6F-4684-B84E-F0E24C318677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.1:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"AB5A6F28-5B2E-4020-AC22-5FF1AB5DC0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.1:update1:linux:*:*:*:*:*\",\"matchCriteriaId\":\"2458734D-2871-4104-B791-F12218A65CA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.1:update1:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"CEB5308E-DFBE-4038-A618-F5448E7B590D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.1:update1:windows:*:*:*:*:*\",\"matchCriteriaId\":\"BF2F0F47-CB18-41EC-9500-9BCCBBF0055F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.1:update4:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"C16614FE-919F-4141-A6F0-8E8F5D79FFDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.1:update4:windows:*:*:*:*:*\",\"matchCriteriaId\":\"6E75D769-12E0-47BD-AE43-4149F98371C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.1_03:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"C1C8FAED-AD0F-4B28-A5EF-DBD6514D60CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.1_03:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"16C38B5F-673D-47F2-87C6-59B2CBF917BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.3.1_03:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"78916851-B219-4E06-A35F-EAF3680A8F75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"16EB847E-C18B-4B07-940D-C0E312D11365\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"68727223-1523-467A-8AAA-ED3E4C6C4B61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"682E551B-7B86-4161-84D5-6E1D9664A2A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.0_01:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"282FD7B0-6D3B-45A1-B717-15FB7A8128EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.0_01:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"09F85CA0-99C0-489D-BFF7-45D97C9DFC09\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/8958\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1006935\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-55100-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/393292\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/7824\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/12189\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/8958\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1006935\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-55100-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/393292\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/7824\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/12189\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…