CVE-2016-2510

BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 96%
VendorProductVersion
beanshellbeanshell
1.0
beanshellbeanshell
2.0:beta1
beanshellbeanshell
2.0:beta4
beanshellbeanshell
2.0:beta5
debiandebian_linux
7.0
debiandebian_linux
8.0
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
15.10
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
bsh
sid
2.0b4-20
fixed
trixie
2.0b4-20
fixed
bookworm
2.0b4-20
fixed
bullseye
2.0b4-20
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
bsh
wily
Fixed 2.0b4-15ubuntu0.15.10.1
released
trusty
Fixed 2.0b4-15ubuntu0.14.04.1
released
precise
Fixed 2.0b4-12ubuntu0.1
released
Common Weakness Enumeration
References