{"uuid": "2c558690-5ed3-4cb8-a86f-36cd54fd41f8", "vulnerability": {"vulnId": "CVE-2016-3427", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "2c558690-5ed3-4cb8-a86f-36cd54fd41f8"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2023-05-12T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2023-05-12T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2023-05-12T00:00:00Z"}, "scope": {"notes": "KEV entry: Oracle Java SE and JRockit Unspecified Vulnerability | Affected: Oracle / Java SE and JRockit | Description: Oracle Java SE and JRockit contains an unspecified vulnerability that allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Java Management Extensions (JMX). This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. | Required action: Apply updates per vendor instructions. | Due date: 2023-06-02 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://www.oracle.com/security-alerts/cpuapr2016v3.html; https://nvd.nist.gov/vuln/detail/CVE-2016-3427"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": [], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Java SE and JRockit", "due_date": "2023-06-02", "date_added": "2023-05-12", "vendorProject": "Oracle", "vulnerabilityName": "Oracle Java SE and JRockit Unspecified Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2016-3427", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2016-3427"}]}
