mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
256 lines
8.6 KiB
JSON
256 lines
8.6 KiB
JSON
{
|
|
"id": "CVE-2005-3907",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2005-11-30T11:03:00.000",
|
|
"lastModified": "2018-10-30T16:26:21.390",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in Java Runtime Environment in Java JDK and JRE 5.0 Update 3 and earlier allows remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary applications via unknown attack vectors involving untrusted Java applets."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 7.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": true,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jdk:1.5.0_03:*:linux:*:*:*:*:*",
|
|
"matchCriteriaId": "04750697-851D-40E6-B13A-1257FD7CB0A4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jdk:1.5.0_03:*:solaris:*:*:*:*:*",
|
|
"matchCriteriaId": "0DF9EC3A-E40C-415B-8BF3-40D3C474AF70"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jdk:1.5.0_03:*:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "937EEE89-443C-4435-9064-EE228B3CEBD9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AAB87D43-2860-43DD-94EE-886D7D75A351"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7F30BCF2-E6A3-49E9-98BC-7948244C8FF7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8966374E-426B-42A7-9D62-9A9A14032390"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "634F8387-DFBE-4B78-9063-65737160F13A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "923FA413-0F4E-4373-83F9-80DC9CA57D15"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A06743B3-2637-47C2-BD1A-28D9F584ED75"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "399B06AC-E101-48EE-A362-D75F7072FF5E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F7F1CF2B-F0B6-45DD-88E1-C0BDF2B973BB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.3.1:update15:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BF5081A4-C1D4-4312-BF0B-DEB47836953B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.3.1:update1a:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04FB9247-7DB5-46A1-9E99-C25A729FB5D7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.3.1:update4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "218831F9-2C00-4E66-B3B8-B9537C89863F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.3.1:update8:*:*:*:*:*:*",
|
|
"matchCriteriaId": "50C269C1-8B4F-4622-A937-DABE766C2CEA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.4.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "355CB56A-A598-4CD6-9AFB-FE0B09FFC2C9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "63978872-E797-4F13-B0F9-98CB67D0962A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "133A7B66-E0B3-4867-A5A4-3C54D6C0C8ED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A7FC09E8-7F30-4FE4-912E-588AA250E2A3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7EA5B9E9-654D-44F7-AE98-3D8B382804AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "44051CFE-D15D-4416-A123-F3E49C67A9E7"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://lists.apple.com/archives/security-announce/2005/Nov/msg00004.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://securitytracker.com/id?1015282",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102050-1",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/355284",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/15615",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2005/2636",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2005/2675",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23250",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |