var-201611-0166
Vulnerability from variot
A vulnerability in the Slowpath of StarOS for Cisco ASR 5500 Series routers with Data Processing Card 2 (DPC2) could allow an unauthenticated, remote attacker to cause a subset of the subscriber sessions to be disconnected, resulting in a partial denial of service (DoS) condition. This vulnerability affects Cisco ASR 5500 devices with Data Processing Card 2 (DPC2) running StarOS 18.0 or later. More Information: CSCvb12081. Known Affected Releases: 18.7.4 19.5.0 20.0.2.64048 20.2.3 21.0.0. Known Fixed Releases: 18.7.4 18.7.4.65030 18.8.M0.65044 19.5.0 19.5.0.65092 19.5.M0.65023 19.5.M0.65050 20.2.3 20.2.3.64982 20.2.3.65017 20.2.a4.65307 20.3.M0.64984 20.3.M0.65029 20.3.M0.65037 20.3.M0.65071 20.3.T0.64985 20.3.T0.65031 20.3.T0.65043 20.3.T0.65067 21.0.0 21.0.0.65256 21.0.M0.64922 21.0.M0.64983 21.0.M0.65140 21.0.V0.65150 21.1.A0.64932 21.1.A0.64987 21.1.A0.65145 21.1.PP0.65270 21.1.R0.65130 21.1.R0.65135 21.1.R0.65154 21.1.VC0.65203 21.2.A0.65147. Vendors have confirmed this vulnerability Bug ID CSCvb12081 It is released as.Part of a subscriber session by a third party (subset) Resulting in service disruption (DoS) There is a possibility of being put into a state. The Cisco ASR5000 Series is a carrier-grade platform for deploying high-demand 3G networks and migrating to Long Term Evolution (LTE). After installing the DPC2 on the Cisco ASR5500 series router, there is a security hole in StarOSSlowpath. Cisco StarOS for ASR 5500 Series routers are prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition. This issue is being tracked by Cisco Bug ID CSCvb12081. StarOS is a set of Linux operating systems used in it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201611-0166", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "18.1.0.59780" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "18.3_base" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "18.0.0.59211" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "18.1.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "18.0.l0.59219" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "20.0.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "19.0.1" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "18.0.0.59167" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "19.3.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "18.4.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "19.0.m0.61045" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "18.1_base" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "19.1.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "19.0.m0.60828" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "19.0.m0.60737" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "18.3.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "19.1.0.61559" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "18.0.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "18.1.0.59776" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "19.2.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "18.0.0.57828" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "18.0.0" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "18.0.0.57828" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "18.0.0.59167" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "18.0.0.59211" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "18.0.l0.59219" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "18.1 base" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "18.1.0" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "18.1.0.59776" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "18.1.0.59780" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "18.3 base" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "18.3.0" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "18.4.0" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "19.0.1" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "19.0.m0.60737" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "19.0.m0.60828" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "19.0.m0.61045" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "19.1.0" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "19.1.0.61559" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "19.2.0" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "19.3.0" }, { "model": "asr 5000 series software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "20.0.0" }, { "model": "asr 5500 router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "staros on asr", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5000\u003e=18.0" }, { "model": "staros", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20.0" }, { "model": "staros", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "19.0" }, { "model": "staros", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "18.0" }, { "model": "asr", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "55000" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10623" }, { "db": "BID", "id": "94071" }, { "db": "JVNDB", "id": "JVNDB-2016-005737" }, { "db": "CNNVD", "id": "CNNVD-201611-002" }, { "db": "NVD", "id": "CVE-2016-6455" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cisco:asr_5000_series_software", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:asr_5500", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-005737" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "94071" } ], "trust": 0.3 }, "cve": "CVE-2016-6455", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2016-6455", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2016-10623", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-95275", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2016-6455", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-6455", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-6455", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-10623", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201611-002", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-95275", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10623" }, { "db": "VULHUB", "id": "VHN-95275" }, { "db": "JVNDB", "id": "JVNDB-2016-005737" }, { "db": "CNNVD", "id": "CNNVD-201611-002" }, { "db": "NVD", "id": "CVE-2016-6455" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the Slowpath of StarOS for Cisco ASR 5500 Series routers with Data Processing Card 2 (DPC2) could allow an unauthenticated, remote attacker to cause a subset of the subscriber sessions to be disconnected, resulting in a partial denial of service (DoS) condition. This vulnerability affects Cisco ASR 5500 devices with Data Processing Card 2 (DPC2) running StarOS 18.0 or later. More Information: CSCvb12081. Known Affected Releases: 18.7.4 19.5.0 20.0.2.64048 20.2.3 21.0.0. Known Fixed Releases: 18.7.4 18.7.4.65030 18.8.M0.65044 19.5.0 19.5.0.65092 19.5.M0.65023 19.5.M0.65050 20.2.3 20.2.3.64982 20.2.3.65017 20.2.a4.65307 20.3.M0.64984 20.3.M0.65029 20.3.M0.65037 20.3.M0.65071 20.3.T0.64985 20.3.T0.65031 20.3.T0.65043 20.3.T0.65067 21.0.0 21.0.0.65256 21.0.M0.64922 21.0.M0.64983 21.0.M0.65140 21.0.V0.65150 21.1.A0.64932 21.1.A0.64987 21.1.A0.65145 21.1.PP0.65270 21.1.R0.65130 21.1.R0.65135 21.1.R0.65154 21.1.VC0.65203 21.2.A0.65147. Vendors have confirmed this vulnerability Bug ID CSCvb12081 It is released as.Part of a subscriber session by a third party (subset) Resulting in service disruption (DoS) There is a possibility of being put into a state. The Cisco ASR5000 Series is a carrier-grade platform for deploying high-demand 3G networks and migrating to Long Term Evolution (LTE). After installing the DPC2 on the Cisco ASR5500 series router, there is a security hole in StarOSSlowpath. Cisco StarOS for ASR 5500 Series routers are prone to a remote denial-of-service vulnerability. \nAn attacker can exploit this issue to cause a denial-of-service condition. \nThis issue is being tracked by Cisco Bug ID CSCvb12081. StarOS is a set of Linux operating systems used in it", "sources": [ { "db": "NVD", "id": "CVE-2016-6455" }, { "db": "JVNDB", "id": "JVNDB-2016-005737" }, { "db": "CNVD", "id": "CNVD-2016-10623" }, { "db": "BID", "id": "94071" }, { "db": "VULHUB", "id": "VHN-95275" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-6455", "trust": 3.4 }, { "db": "BID", "id": "94071", "trust": 2.0 }, { "db": "SECTRACK", "id": "1037186", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2016-005737", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201611-002", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-10623", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-95275", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10623" }, { "db": "VULHUB", "id": "VHN-95275" }, { "db": "BID", "id": "94071" }, { "db": "JVNDB", "id": "JVNDB-2016-005737" }, { "db": "CNNVD", "id": "CNNVD-201611-002" }, { "db": "NVD", "id": "CVE-2016-6455" } ] }, "id": "VAR-201611-0166", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-10623" }, { "db": "VULHUB", "id": "VHN-95275" } ], "trust": 1.5488889 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10623" } ] }, "last_update_date": "2024-11-23T23:09:10.880000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20161102-asr", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-asr" }, { "title": "Patch for CiscoASR5500 SeriesRouters Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/83528" }, { "title": "Cisco ASR 5500 Series routers Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=65232" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10623" }, { "db": "JVNDB", "id": "JVNDB-2016-005737" }, { "db": "CNNVD", "id": "CNNVD-201611-002" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95275" }, { "db": "JVNDB", "id": "JVNDB-2016-005737" }, { "db": "NVD", "id": "CVE-2016-6455" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161102-asr" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/94071" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1037186" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6455" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6455" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-10623" }, { "db": "VULHUB", "id": "VHN-95275" }, { "db": "BID", "id": "94071" }, { "db": "JVNDB", "id": "JVNDB-2016-005737" }, { "db": "CNNVD", "id": "CNNVD-201611-002" }, { "db": "NVD", "id": "CVE-2016-6455" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-10623" }, { "db": "VULHUB", "id": "VHN-95275" }, { "db": "BID", "id": "94071" }, { "db": "JVNDB", "id": "JVNDB-2016-005737" }, { "db": "CNNVD", "id": "CNNVD-201611-002" }, { "db": "NVD", "id": "CVE-2016-6455" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-11-04T00:00:00", "db": "CNVD", "id": "CNVD-2016-10623" }, { "date": "2016-11-03T00:00:00", "db": "VULHUB", "id": "VHN-95275" }, { "date": "2016-11-02T00:00:00", "db": "BID", "id": "94071" }, { "date": "2016-11-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005737" }, { "date": "2016-11-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201611-002" }, { "date": "2016-11-03T21:59:10.967000", "db": "NVD", "id": "CVE-2016-6455" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-11-04T00:00:00", "db": "CNVD", "id": "CNVD-2016-10623" }, { "date": "2017-07-29T00:00:00", "db": "VULHUB", "id": "VHN-95275" }, { "date": "2016-11-24T01:07:00", "db": "BID", "id": "94071" }, { "date": "2016-11-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-005737" }, { "date": "2016-11-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201611-002" }, { "date": "2024-11-21T02:56:10.037000", "db": "NVD", "id": "CVE-2016-6455" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201611-002" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco ASR 5500 Series Routers Denial of Service Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2016-10623" }, { "db": "CNNVD", "id": "CNNVD-201611-002" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201611-002" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.