CVE-2016-2510

EUVD-2022-4031
BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
Affected Products (NVD)
VendorProductVersion
beanshellbeanshell
1.0
beanshellbeanshell
2.0:beta1
beanshellbeanshell
2.0:beta4
beanshellbeanshell
2.0:beta5
debiandebian_linux
7.0
debiandebian_linux
8.0
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
15.10
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
bsh
bookworm
2.0b4-20
fixed
bullseye
2.0b4-20
fixed
sid
2.0b4-20
fixed
trixie
2.0b4-20
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
bsh
precise
Fixed 2.0b4-12ubuntu0.1
released
trusty
Fixed 2.0b4-15ubuntu0.14.04.1
released
wily
Fixed 2.0b4-15ubuntu0.15.10.1
released
Common Weakness Enumeration
References