Vulnerability Details : CVE-2003-1123
Sun Java Runtime Environment (JRE) and SDK 1.4.0_01 and earlier allows untrusted applets to access certain information within trusted applets, which allows attackers to bypass the restrictions of the Java security model.
Exploit prediction scoring system (EPSS) score for CVE-2003-1123
Probability of exploitation activity in the next 30 days: 1.68%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 87 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2003-1123
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2003-1123
-
http://www.kb.cert.org/vuls/id/393292
Patch;Third Party Advisory;US Government Resource
-
http://www.securityfocus.com/bid/7824
Exploit;Patch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/12189
-
http://securitytracker.com/id?1006935
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-55100-1
Patch;Vendor Advisory
Products affected by CVE-2003-1123
- cpe:2.3:a:sun:jdk:1.3.0_02:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_02:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_02:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.2.2_10:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.2.2_11:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_05:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_05:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_04:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.2.2_11:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.2.2_11:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.0_05:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_01:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_01:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4.0_01:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.2.2:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.2.2_12:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_01a:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_03:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.4:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.2.2_10:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.2.2_10:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_03:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jdk:1.3.1_03:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update2:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update2:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update2:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2:update10:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2:update10:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2:update10:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2_003:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update1:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update1:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.0_01:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4.0_01:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update5:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_03:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_03:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2_011:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2_011:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update4:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update1:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update4:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2_011:*:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.2.2_012:*:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update5:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.0:update5:solaris:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1:update4:windows:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.3.1_03:*:linux:*:*:*:*:*
- cpe:2.3:a:sun:jre:1.4:*:windows:*:*:*:*:*