{"vulnerability": "cve-2016-3427", "sightings": [{"uuid": "e502c22a-3b46-4586-a2c0-8689c9218a3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-3427", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:03.000000Z"}, {"uuid": "cb992eb8-2508-458a-b558-f6cf3edafa2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-3427", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971811", "content": "", "creation_timestamp": "2024-12-24T20:34:21.963533Z"}, {"uuid": "7af6aa52-70db-4230-8df9-d38728cb8349", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-3427", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971812", "content": "", "creation_timestamp": "2024-12-24T20:34:22.003420Z"}, {"uuid": "8e442316-48db-4078-9c83-9180a91c0c7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-3427", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:11.000000Z"}, {"uuid": "5ca45346-9e0b-462f-bfd8-d66f7bbd26d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2016-3427", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/c7bba0cc-c87f-4f5e-a580-06521f318daf", "content": "", "creation_timestamp": "2026-02-02T12:26:59.744043Z"}, {"uuid": "e3d3cc5a-508e-41b6-9d18-57364c2397fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-3427", "type": "seen", "source": "Telegram/HO1GC9lvGwuSTxA8-o9R8vbMH6vodeUiA1kiw3O6sNg0eCH9", "content": "", "creation_timestamp": "2025-02-06T02:41:39.000000Z"}, {"uuid": "f9563378-6fa3-425e-b578-390b8e72ac96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-3427", "type": "seen", "source": "Telegram/Wmz2NNKyCY1pAGBTYVcFqi7_22wiKWXTgnb--bvdtO5N8Nlr", "content": "", "creation_timestamp": "2025-02-06T02:42:29.000000Z"}, {"uuid": "7135e226-690b-4d2d-96d6-ab06a33c4311", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-3427", "type": "seen", "source": "https://t.me/arpsyndicate/935", "content": "#ExploitObserverAlert\n\nCVE-2016-3427\n\nDESCRIPTION: Exploit Observer has 75 entries related to CVE-2016-3427. Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.\n\nFIRST-EPSS: 0.078110000\nNVD-IS: 6.0\nNVD-ES: 2.2", "creation_timestamp": "2023-12-03T12:49:34.000000Z"}, {"uuid": "2d3b34b3-3e04-4ea2-8bf8-f58b2b02f5a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-3427", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:12:59.000000Z"}, {"uuid": "df7154cf-22c3-4cfd-a4e3-503402a4ed27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-3427", "type": "seen", "source": "Telegram/kQiGK2e6o8-YFgDNhEi_1A4es0f3IKNLKOrIe0nM7h3u5xlJ", "content": "", "creation_timestamp": "2025-01-28T03:22:55.000000Z"}, {"uuid": "add814d7-a2e6-484a-b60f-559665808dc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-3427", "type": "seen", "source": "https://t.me/theninjaway1337/1371", "content": "CISA: Several Old Linux Vulnerabilities Exploited in Attacks\n\nThe US Cybersecurity and Infrastructure Security Agency (CISA) has added several Linux and Linux-related flaws to its known exploited vulnerabilities (KEV) catalog.\nThe agency\u00a0added seven new vulnerabilities\u00a0to its KEV catalog on Friday: Ruckus AP remote code execution (CVE-2023-25717), Red Hat Polkit privilege escalation (CVE-2021-3560), Linux kernel privilege escalations (CVE-2014-0196 and CVE-2010-3904), Jenkins UI information disclosure (CVE-2015-5317), Apache Tomcat remote code execution (CVE-2016-8735), and an Oracle Java SE and JRockit issue (CVE-2016-3427).\n\nhttps://www.securityweek.com/cisa-several-old-linux-vulnerabilities-exploited-in-attacks/", "creation_timestamp": "2023-05-16T15:47:20.000000Z"}]}