10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.966 High
EPSS
Percentile
99.6%
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Java Runtime Environment. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the native code for initImageLayouts. Buffer overflows exist such that a remote attacker can create a custom image class that can leverage these vulnerabilities to execute code under the context of the user running the process.