Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2019-2697
10 documents9 sources
Severity
8.1HIGH
EPSS
4.1%
top 11.44%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedApr 23
Latest updateMay 24
Description
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets …
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9
Affected Packages9 packages
Also affects: Ubuntu Linux 16.04, 18.04, 18.10, 19.04, Enterprise Linux 8.0, 8.6
Patches
🔴Vulnerability Details
4GHSA▶
GHSA-rpf9-c8x3-2pp3: Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D)↗2022-05-24
OSV▶
CVE-2019-2697: Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D)↗2019-04-23
CVEList▶
CVE-2019-2697: Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D)↗2019-04-23
💥Exploits & PoCs
1Exploit-DB▶
Oracle Java Runtime Environment - Heap Corruption During TTF font Rendering in sc_FindExtrema4↗2019-04-17
📋Vendor Advisories
3💬Community
1Bugzilla
▶