VAR-201602-0123

Vulnerability from variot - Updated: 2023-12-18 12:06

The cliserver implementation in Dell SonicWALL GMS, Analyzer, and UMA EM5000 7.2, 8.0, and 8.1 before Hotfix 168056 allows remote attackers to deserialize and execute arbitrary Java code via crafted XML data. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. An attacker can leverage this vulnerability to execute arbitrary code under the context of root. Multiple Dell SonicWALL Products are prone to a remote code-execution vulnerability. Successful exploitation can completely compromise the vulnerable device. The following products are vulnerable: Dell SonicWALL Global Management System Dell SonicWALL Analyzer Dell SonicWALL Universal Managemnet Appliance NOTE: This BID is being retired as it is a duplicate of BID 83200 (Multiple Dell SonicWALL Products Multiple Remote Code Execution Vulnerabilities). GMS is a global management system for rapid deployment and centralized management of SonicWALL infrastructure. Analyzer is a set of network analyzer software for SonicWALL infrastructure. UMA EM5000 is a set of general management equipment software

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201602-0123",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "uma em5000",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "8.0"
      },
      {
        "model": "global management system",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "8.0"
      },
      {
        "model": "uma em5000",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "7.2"
      },
      {
        "model": "global management system",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "7.2"
      },
      {
        "model": "analyzer",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "8.1"
      },
      {
        "model": "global management system",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "8.1"
      },
      {
        "model": "analyzer",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "8.0"
      },
      {
        "model": "analyzer",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "7.2"
      },
      {
        "model": "uma em5000",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sonicwall",
        "version": "8.1"
      },
      {
        "model": "sonicwall global management system",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "dell",
        "version": "8.0"
      },
      {
        "model": "sonicwall global management system",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "dell",
        "version": "7.2"
      },
      {
        "model": "sonicwall analyzer",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "dell",
        "version": "8.0"
      },
      {
        "model": "sonicwall analyzer",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "dell",
        "version": "7.2"
      },
      {
        "model": "sonicwall global management system",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "dell",
        "version": "8.1 hotfix 168056"
      },
      {
        "model": "sonicwall analyzer",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "dell",
        "version": "8.1 hotfix 168056"
      },
      {
        "model": "sonicwall global management system",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "dell",
        "version": "8.1"
      },
      {
        "model": "sonicwall e-class universal management appliance em5000",
        "scope": null,
        "trust": 0.8,
        "vendor": "dell",
        "version": null
      },
      {
        "model": "sonicwall analyzer",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "dell",
        "version": "8.1"
      },
      {
        "model": "sonicwall e-class universal management appliance em5000",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "dell",
        "version": "7.2"
      },
      {
        "model": "sonicwall e-class universal management appliance em5000",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "dell",
        "version": "8.1 hotfix 168056"
      },
      {
        "model": "sonicwall e-class universal management appliance em5000",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "dell",
        "version": "8.1"
      },
      {
        "model": "sonicwall e-class universal management appliance em5000",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "dell",
        "version": "8.0"
      },
      {
        "model": "gms virtual appliance",
        "scope": null,
        "trust": 0.7,
        "vendor": "sonicwall",
        "version": null
      },
      {
        "model": "sonicwall universal management appliance em5000",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "8.1"
      },
      {
        "model": "sonicwall universal management appliance em5000",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "8.0"
      },
      {
        "model": "sonicwall universal management appliance",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "7.2"
      },
      {
        "model": "sonicwall global management system",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "8.1"
      },
      {
        "model": "sonicwall analyzer",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "dell",
        "version": "8.1"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-163"
      },
      {
        "db": "BID",
        "id": "84882"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2397"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-323"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:sonicwall:uma_em5000_firmware:8.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:sonicwall:uma_em5000_firmware:8.1:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:sonicwall:uma_em5000_firmware:7.2:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:sonicwall:uma_em5000:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:sonicwall:global_management_system:7.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sonicwall:global_management_system:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sonicwall:global_management_system:8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sonicwall:analyzer:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sonicwall:analyzer:7.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sonicwall:analyzer:8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-2397"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "cpnrodzc7",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-163"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2016-2397",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2016-2397",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 1.6,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-91216",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2016-2397",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2016-2397",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "ZDI",
            "id": "CVE-2016-2397",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201602-323",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-91216",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2016-2397",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-163"
      },
      {
        "db": "VULHUB",
        "id": "VHN-91216"
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-2397"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2397"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-323"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The cliserver implementation in Dell SonicWALL GMS, Analyzer, and UMA EM5000 7.2, 8.0, and 8.1 before Hotfix 168056 allows remote attackers to deserialize and execute arbitrary Java code via crafted XML data. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified.  An attacker can leverage this vulnerability to execute arbitrary code under the context of root. Multiple Dell SonicWALL Products are prone to a remote code-execution vulnerability. Successful exploitation can completely compromise the vulnerable device. \nThe following products are vulnerable:\nDell SonicWALL Global Management System\nDell SonicWALL Analyzer\nDell SonicWALL Universal Managemnet Appliance\nNOTE: This BID is being retired as it is a duplicate of BID 83200 (Multiple Dell SonicWALL Products Multiple Remote Code Execution Vulnerabilities). GMS is a global management system for rapid deployment and centralized management of SonicWALL infrastructure. Analyzer is a set of network analyzer software for SonicWALL infrastructure. UMA EM5000 is a set of general management equipment software",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-2397"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      },
      {
        "db": "ZDI",
        "id": "ZDI-16-163"
      },
      {
        "db": "BID",
        "id": "84882"
      },
      {
        "db": "VULHUB",
        "id": "VHN-91216"
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-2397"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-16-163",
        "trust": 3.6
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2397",
        "trust": 3.3
      },
      {
        "db": "SECTRACK",
        "id": "1035015",
        "trust": 1.2
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-3137",
        "trust": 0.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-323",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "84882",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VHN-91216",
        "trust": 0.1
      },
      {
        "db": "BID",
        "id": "83200",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-2397",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-163"
      },
      {
        "db": "VULHUB",
        "id": "VHN-91216"
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-2397"
      },
      {
        "db": "BID",
        "id": "84882"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2397"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-323"
      }
    ]
  },
  "id": "VAR-201602-0123",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-91216"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:06:15.022000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SonicWALL Analyzer Product Notification",
        "trust": 0.8,
        "url": "https://support.software.dell.com/ja-jp/product-notification/185943"
      },
      {
        "title": "SonicWALL has issued an update to correct this vulnerability.        Hotfix 168056",
        "trust": 0.7,
        "url": "https://www.mysonicwall.com/firmware/downloadcenter.aspx"
      },
      {
        "title": "Multiple Dell Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=60259"
      },
      {
        "title": "Java-Deserialization-CVEs",
        "trust": 0.1,
        "url": "https://github.com/palindromelabs/java-deserialization-cves "
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-163"
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-2397"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-323"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-77",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-91216"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2397"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "https://support.software.dell.com/product-notification/185943"
      },
      {
        "trust": 1.8,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-163"
      },
      {
        "trust": 1.2,
        "url": "http://www.securitytracker.com/id/1035015"
      },
      {
        "trust": 1.1,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-16-163/"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2397"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-2397"
      },
      {
        "trust": 0.7,
        "url": "https://www.mysonicwall.com/firmware/downloadcenter.aspx"
      },
      {
        "trust": 0.3,
        "url": "http://www.sonicwall.com/us/en/products/gms-series.html"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/77.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.securityfocus.com/bid/83200"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/palindromelabs/java-deserialization-cves"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-16-163"
      },
      {
        "db": "VULHUB",
        "id": "VHN-91216"
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-2397"
      },
      {
        "db": "BID",
        "id": "84882"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2397"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-323"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-16-163"
      },
      {
        "db": "VULHUB",
        "id": "VHN-91216"
      },
      {
        "db": "VULMON",
        "id": "CVE-2016-2397"
      },
      {
        "db": "BID",
        "id": "84882"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-2397"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-323"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-02-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-163"
      },
      {
        "date": "2016-02-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-91216"
      },
      {
        "date": "2016-02-17T00:00:00",
        "db": "VULMON",
        "id": "CVE-2016-2397"
      },
      {
        "date": "2016-02-17T00:00:00",
        "db": "BID",
        "id": "84882"
      },
      {
        "date": "2016-03-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      },
      {
        "date": "2016-02-17T15:59:07.690000",
        "db": "NVD",
        "id": "CVE-2016-2397"
      },
      {
        "date": "2016-02-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201602-323"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-02-10T00:00:00",
        "db": "ZDI",
        "id": "ZDI-16-163"
      },
      {
        "date": "2018-03-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-91216"
      },
      {
        "date": "2018-03-12T00:00:00",
        "db": "VULMON",
        "id": "CVE-2016-2397"
      },
      {
        "date": "2016-09-01T17:00:00",
        "db": "BID",
        "id": "84882"
      },
      {
        "date": "2016-03-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      },
      {
        "date": "2018-03-12T17:31:18.707000",
        "db": "NVD",
        "id": "CVE-2016-2397"
      },
      {
        "date": "2016-02-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201602-323"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-323"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Dell SonicWALL Product  cliserver Implementation of deserialization vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-001704"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201602-323"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…