Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:sun:jdk:1.5.0_03:*:linux:*:*:*:*:*", "matchCriteriaId": "04750697-851D-40E6-B13A-1257FD7CB0A4", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jdk:1.5.0_03:*:solaris:*:*:*:*:*", "matchCriteriaId": "0DF9EC3A-E40C-415B-8BF3-40D3C474AF70", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jdk:1.5.0_03:*:windows:*:*:*:*:*", "matchCriteriaId": "937EEE89-443C-4435-9064-EE228B3CEBD9", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "AAB87D43-2860-43DD-94EE-886D7D75A351", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.3.0:update1:*:*:*:*:*:*", "matchCriteriaId": "7F30BCF2-E6A3-49E9-98BC-7948244C8FF7", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.3.0:update2:*:*:*:*:*:*", "matchCriteriaId": "8966374E-426B-42A7-9D62-9A9A14032390", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.3.0:update3:*:*:*:*:*:*", "matchCriteriaId": "634F8387-DFBE-4B78-9063-65737160F13A", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.3.0:update4:*:*:*:*:*:*", "matchCriteriaId": "923FA413-0F4E-4373-83F9-80DC9CA57D15", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.3.0:update5:*:*:*:*:*:*", "matchCriteriaId": "A06743B3-2637-47C2-BD1A-28D9F584ED75", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "399B06AC-E101-48EE-A362-D75F7072FF5E", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.3.1:update1:*:*:*:*:*:*", "matchCriteriaId": "F7F1CF2B-F0B6-45DD-88E1-C0BDF2B973BB", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.3.1:update15:*:*:*:*:*:*", "matchCriteriaId": "BF5081A4-C1D4-4312-BF0B-DEB47836953B", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.3.1:update1a:*:*:*:*:*:*", "matchCriteriaId": "04FB9247-7DB5-46A1-9E99-C25A729FB5D7", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.3.1:update4:*:*:*:*:*:*", "matchCriteriaId": "218831F9-2C00-4E66-B3B8-B9537C89863F", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.3.1:update8:*:*:*:*:*:*", "matchCriteriaId": "50C269C1-8B4F-4622-A937-DABE766C2CEA", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "355CB56A-A598-4CD6-9AFB-FE0B09FFC2C9", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "63978872-E797-4F13-B0F9-98CB67D0962A", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "133A7B66-E0B3-4867-A5A4-3C54D6C0C8ED", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*", "matchCriteriaId": "A7FC09E8-7F30-4FE4-912E-588AA250E2A3", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*", "matchCriteriaId": "7EA5B9E9-654D-44F7-AE98-3D8B382804AC", "vulnerable": true}, {"criteria": "cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*", "matchCriteriaId": "44051CFE-D15D-4416-A123-F3E49C67A9E7", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Unspecified vulnerability in Java Runtime Environment in Java JDK and JRE 5.0 Update 3 and earlier allows remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary applications via unknown attack vectors involving untrusted Java applets."}], "id": "CVE-2005-3907", "lastModified": "2025-04-03T01:03:51.193", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2005-11-30T11:03:00.000", "references": [{"source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2005/Nov/msg00004.html"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/17748"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/17847"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/18092"}, {"source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015282"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102050-1"}, {"source": "cve@mitre.org", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/355284"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/15615"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2005/2636"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2005/2675"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23250"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2005/Nov/msg00004.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://secunia.com/advisories/17748"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/17847"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/18092"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015282"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://sunsolve.sun.com/searchproxy/document.do?assetkey=1-26-102050-1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["US Government Resource"], "url": "http://www.kb.cert.org/vuls/id/355284"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/15615"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2005/2636"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2005/2675"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23250"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}