2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2005-1974" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2005-06-16T04:00:00.000" ,
"lastModified" : "2016-10-18T03:23:42.907" ,
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Unspecified vulnerability in Java 2 Platform, Standard Edition (J2SE) 5.0 and 5.0 Update 1 and J2SE 1.4.2 up to 1.4.2_07, as used in multiple products and platforms including (1) HP-UX and (2) APC PowerChute, allows applications to assign permissions to themselves and gain privileges."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:H/Au:N/C:P/I:P/A:P" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "HIGH" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 5.1
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 4.9 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : true ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:j2se:1.4.2:*:sdk:*:*:*:*:*" ,
"matchCriteriaId" : "E2D500E0-A80D-4C9E-94F0-6B59AFEB186A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:j2se:1.4.2_01:*:sdk:*:*:*:*:*" ,
"matchCriteriaId" : "BA17272A-FCA5-420D-8724-35F15190C1AD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:j2se:1.4.2_02:*:sdk:*:*:*:*:*" ,
"matchCriteriaId" : "6D6E25CB-6C06-43D0-949E-BB3FEE886CCD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:j2se:1.4.2_03:*:sdk:*:*:*:*:*" ,
"matchCriteriaId" : "B1DD35E9-9FED-49D3-8343-B9EF2C8A9C35"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:j2se:1.4.2_04:*:sdk:*:*:*:*:*" ,
"matchCriteriaId" : "23F6CB66-75D5-472C-A6CD-8598376A065A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:j2se:1.4.2_05:*:sdk:*:*:*:*:*" ,
"matchCriteriaId" : "641FA125-3979-4F12-9764-ADF06E243248"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:j2se:1.4.2_06:*:sdk:*:*:*:*:*" ,
"matchCriteriaId" : "9F5D9D33-F7D9-4A82-BA32-800A265B16CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:j2se:1.4.2_07:*:sdk:*:*:*:*:*" ,
"matchCriteriaId" : "BB7658E7-5BDE-4C2A-93FF-CC78C562BF7E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:j2se:5.0:*:sdk:*:*:*:*:*" ,
"matchCriteriaId" : "AB323619-76BA-4DCF-9613-4C963C235D09"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sun:j2se:5.0_update1:*:sdk:*:*:*:*:*" ,
"matchCriteriaId" : "90A293D3-9A69-4B33-82CE-22A7515819E3"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://marc.info/?l=bugtraq&m=112861772130119&w=2" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=112992075412844&w=2" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://nam-en.apc.com/cgi-bin/nam_en.cfg/php/enduser/std_adp.php?p_faqid=7638" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://rpmfind.net/linux/RPM/suse/updates/9.3/i386/rpm/i586/java-1_4_2-sun-src-1.4.2.08-0.1.i586.html" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/17272" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securityreason.com/securityalert/56" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://securitytracker.com/id?1015643" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101749-1" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101799-1" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.novell.com/linux/security/advisories/2005_32_java2.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/13958" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2005/2150" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
}
]
}