Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-2540

EPSS 0.45% · P64
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-2540

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Vulnerability in the Java Advanced Management Console component of Oracle Java SE (subcomponent: Server). The supported version that is affected is Java Advanced Management Console: 2.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java Advanced Management Console. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java Advanced Management Console, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java Advanced Management Console accessible data as well as unauthorized read access to a subset of Java Advanced Management Console accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Oracle Java SE Java Advanced Management Console 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Oracle Java SE是美国甲骨文(Oracle)公司的一套标准版Java平台,用于开发和部署桌面、服务器以及嵌入设备和实时环境中的Java应用程序。Java Advanced Management Console是其中的一个Java高级管理控制台组件,用于创建部署规则和规则集,管理Java应用程序。 Oracle Java SE中的Java Advanced Management Console组件2.12版本的Server子组件存在安全漏洞。远程攻击者可利用该漏洞未授权读取、更新、插入或删除数据
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Oracle CorporationJava Java Advanced Management Console: 2.12 -

II. Public POCs for CVE-2019-2540

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-2540

登录查看更多情报信息。

Same Patch Batch · Oracle Corporation · 2019-01-16 · 155 CVEs total

CVE-2019-2501Oracle Virtualization VM VirtualBox 访问控制错误漏洞
CVE-2019-2492Oracle E-Business Suite Email Center 访问控制错误漏洞
CVE-2019-2493Oracle PeopleSoft Products PeopleSoft Enterprise CS Campus Community 访问控制错误漏洞
CVE-2019-2494Oracle MySQL Server 访问控制错误漏洞
CVE-2019-2495Oracle MySQL Server 访问控制错误漏洞
CVE-2019-2496Oracle E-Business Suite CRM Technical Foundation 访问控制错误漏洞
CVE-2019-2497Oracle E-Business Suite CRM Technical Foundation 访问控制错误漏洞
CVE-2019-2498Oracle E-Business Suite Partner Management 访问控制错误漏洞
CVE-2019-2499Oracle PeopleSoft Products PeopleSoft Enterprise PeopleTools 访问控制错误漏洞
CVE-2019-2500Oracle Virtualization VM VirtualBox 访问控制错误漏洞
CVE-2019-2506Oracle Virtualization VM VirtualBox 访问控制错误漏洞
CVE-2019-2510Oracle MySQL Server 访问控制错误漏洞
CVE-2019-2509Oracle Virtualization VM VirtualBox 访问控制错误漏洞
CVE-2019-2508Oracle Virtualization VM VirtualBox 访问控制错误漏洞
CVE-2019-2507Oracle MySQL Server 访问控制错误漏洞
CVE-2019-2504Oracle Virtualization VM VirtualBox 访问控制错误漏洞
CVE-2019-2502Oracle MySQL Server 访问控制错误漏洞
CVE-2019-2503Oracle MySQL Server 访问控制错误漏洞
CVE-2019-2491Oracle E-Business Suite Email Center 访问控制错误漏洞
CVE-2019-2505Oracle Virtualization VM VirtualBox 访问控制错误漏洞

Showing top 20 of 155 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2019-2540

No comments yet


Leave a comment