{"uuid": "803117f1-001b-424b-87d2-1716128f503f", "vulnerability": {"vulnId": "CVE-2012-5076", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "803117f1-001b-424b-87d2-1716128f503f"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2022-03-28T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2022-03-28T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2022-03-28T00:00:00Z"}, "scope": {"notes": "KEV entry: Oracle Java SE Sandbox Bypass Vulnerability | Affected: Oracle / Java SE | Description: The default Java security properties configuration did not restrict access to the com.sun.org.glassfish.external and com.sun.org.glassfish.gmbal packages. An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions. | Required action: Apply updates per vendor instructions. | Due date: 2022-04-18 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2012-5076"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": [], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Java SE", "due_date": "2022-04-18", "date_added": "2022-03-28", "vendorProject": "Oracle", "vulnerabilityName": "Oracle Java SE Sandbox Bypass Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2012-5076", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2012-5076"}]}
