{"uuid": "ac417b7c-164f-4be9-9e12-c50a4259c0f7", "vulnerability": {"vulnId": "CVE-2016-8735", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "ac417b7c-164f-4be9-9e12-c50a4259c0f7"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2023-05-12T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2023-05-12T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2023-05-12T00:00:00Z"}, "scope": {"notes": "KEV entry: Apache Tomcat Remote Code Execution Vulnerability | Affected: Apache / Tomcat | Description: Apache Tomcat contains an unspecified vulnerability that allows for remote code execution if JmxRemoteLifecycleListener is used and an attacker can reach Java Management Extension (JMX) ports. This CVE exists because this listener wasn't updated for consistency with the Oracle patched issues for CVE-2016-3427 which affected credential types. | Required action: Apply updates per vendor instructions. | Due date: 2023-06-02 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://tomcat.apache.org/security-9.html; https://nvd.nist.gov/vuln/detail/CVE-2016-8735"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-284"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Tomcat", "due_date": "2023-06-02", "date_added": "2023-05-12", "vendorProject": "Apache", "vulnerabilityName": "Apache Tomcat Remote Code Execution Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2016-8735", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2016-8735"}]}
