var-201704-0089
Vulnerability from variot
Symantec SSL Visibility (SSLV) 3.8.4FC, 3.9, 3.10 before 3.10.4.1, and 3.11 before 3.11.3.1 is susceptible to a denial-of-service vulnerability that impacts the SSL servers for intercepted SSL connections. A malicious SSL client can, under certain circumstances, temporarily exhaust the TCP connection pool of an SSL server. SSL Visibility Appliance provided by Blue Coat Systems, Inc. is used as a transparent proxy for encrypted traffic management. It is reported that the appliance generates RST packets with incorrect sequence numbers when it receives HTTPS requests from certain web browsers. When the web server behind the appliance fails to treat these incorrect RST packets, it keeps the encrypted session indefinitely. This behavior may be used to cause a denial-of-service (DoS) condition on the server side. According to the developer, this issue does not affect the appliance. NTT-ME CORPORATION Cyber Security Center reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.A denial-of-service (DoS) attack to a server may be conducted by an unauthenticated remote attacker. ** Delete ** This case JVNDB-2017-000099 It was removed because it was found to be duplicated. below JVNDB-2017-000099 Please refer to. ■JVNDB-2017-000099 (JVN#91438377) * http://jvndb.jvn.jp/ja/contents/2017/JVNDB-2017-000099.html plural Blue Coat SSL Visibility The product contains a resource management vulnerability.Service operation interruption (DoS) An attack may be carried out. Attackers can exploit this issue to cause TCP connection pool exhaustion, leading to a denial-of-service condition. It supports adding SSL inspection functions to advanced threat protection solutions and existing network security architectures. A denial of service vulnerability exists in Blue Coat SSLV 3.x prior to 3.11.3.1
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201704-0089",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ssl visibility appliance sv3800",
"scope": "eq",
"trust": 1.6,
"vendor": "bluecoat",
"version": "3.11.1.1"
},
{
"model": "ssl visibility appliance sv3800",
"scope": "eq",
"trust": 1.6,
"vendor": "bluecoat",
"version": "3.11.1.2"
},
{
"model": "ssl visibility appliance sv2800",
"scope": "eq",
"trust": 1.6,
"vendor": "bluecoat",
"version": "3.11.1.1"
},
{
"model": "ssl visibility appliance sv2800",
"scope": "eq",
"trust": 1.6,
"vendor": "bluecoat",
"version": "3.11.2.1"
},
{
"model": "ssl visibility appliance sv2800",
"scope": "eq",
"trust": 1.6,
"vendor": "bluecoat",
"version": "3.10"
},
{
"model": "ssl visibility appliance sv2800",
"scope": "eq",
"trust": 1.6,
"vendor": "bluecoat",
"version": "3.8.4"
},
{
"model": "ssl visibility appliance sv2800",
"scope": "eq",
"trust": 1.6,
"vendor": "bluecoat",
"version": "3.11.1.2"
},
{
"model": "ssl visibility appliance sv2800",
"scope": "eq",
"trust": 1.6,
"vendor": "bluecoat",
"version": "3.11"
},
{
"model": "ssl visibility appliance sv2800",
"scope": "eq",
"trust": 1.6,
"vendor": "bluecoat",
"version": "3.9"
},
{
"model": "ssl visibility appliance sv3800",
"scope": "eq",
"trust": 1.6,
"vendor": "bluecoat",
"version": "3.11.2.1"
},
{
"model": "ssl visibility appliance sv800",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "3.11.1.1"
},
{
"model": "ssl visibility appliance sv1800",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "3.8.4"
},
{
"model": "ssl visibility appliance sv1800",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "3.11"
},
{
"model": "ssl visibility appliance sv1800",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "3.10"
},
{
"model": "ssl visibility appliance sv1800",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "3.9"
},
{
"model": "ssl visibility appliance sv1800",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "3.11.2.1"
},
{
"model": "ssl visibility appliance sv3800",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "3.8.4"
},
{
"model": "ssl visibility appliance sv800",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "3.8.4"
},
{
"model": "ssl visibility appliance sv800",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "3.9"
},
{
"model": "ssl visibility appliance sv800",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "3.11"
},
{
"model": "ssl visibility appliance sv1800",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "3.11.1.2"
},
{
"model": "ssl visibility appliance sv3800",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "3.9"
},
{
"model": "ssl visibility appliance sv3800",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "3.11"
},
{
"model": "ssl visibility appliance sv3800",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "3.10"
},
{
"model": "ssl visibility appliance sv800",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "3.10"
},
{
"model": "ssl visibility appliance sv800",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "3.11.2.1"
},
{
"model": "ssl visibility appliance sv1800",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "3.11.1.1"
},
{
"model": "ssl visibility appliance sv800",
"scope": "eq",
"trust": 1.0,
"vendor": "bluecoat",
"version": "3.11.1.2"
},
{
"model": "ssl visibility appliance",
"scope": "eq",
"trust": 0.8,
"vendor": "blue coat",
"version": "3.8.4fc, 3.9, 3.10, and 3.11 prior to 3.11.3.1"
},
{
"model": "ssl visibility appliance sv1800",
"scope": null,
"trust": 0.8,
"vendor": "blue coat",
"version": null
},
{
"model": "ssl visibility appliance sv2800",
"scope": null,
"trust": 0.8,
"vendor": "blue coat",
"version": null
},
{
"model": "ssl visibility appliance sv3800",
"scope": null,
"trust": 0.8,
"vendor": "blue coat",
"version": null
},
{
"model": "ssl visibility appliance sv800",
"scope": null,
"trust": 0.8,
"vendor": "blue coat",
"version": null
},
{
"model": "ssl visibility 3.8.4fc",
"scope": null,
"trust": 0.3,
"vendor": "bluecoat",
"version": null
},
{
"model": "ssl visibility",
"scope": "eq",
"trust": 0.3,
"vendor": "bluecoat",
"version": "3.8"
},
{
"model": "ssl visibility",
"scope": "eq",
"trust": 0.3,
"vendor": "bluecoat",
"version": "3.6"
},
{
"model": "ssl visibility",
"scope": "ne",
"trust": 0.3,
"vendor": "bluecoat",
"version": "3.11.3.1"
},
{
"model": "ssl visibility",
"scope": "eq",
"trust": 0.3,
"vendor": "bluecoat",
"version": "3.11"
},
{
"model": "ssl visibility",
"scope": "eq",
"trust": 0.3,
"vendor": "bluecoat",
"version": "3.7"
},
{
"model": "ssl visibility",
"scope": "eq",
"trust": 0.3,
"vendor": "bluecoat",
"version": "3.10"
},
{
"model": "ssl visibility",
"scope": "eq",
"trust": 0.3,
"vendor": "bluecoat",
"version": "3.9"
},
{
"model": "ssl visibility",
"scope": "eq",
"trust": 0.3,
"vendor": "bluecoat",
"version": "3.9.4.1"
},
{
"model": "ssl visibility 3.8.2f",
"scope": null,
"trust": 0.3,
"vendor": "bluecoat",
"version": null
},
{
"model": "ssl visibility 3.8fc",
"scope": null,
"trust": 0.3,
"vendor": "bluecoat",
"version": null
}
],
"sources": [
{
"db": "BID",
"id": "97525"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000099"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003118"
},
{
"db": "CNNVD",
"id": "CNNVD-201703-1029"
},
{
"db": "NVD",
"id": "CVE-2016-10259"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:bluecoat:ssl_visibility_appliance",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-000099"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "NTT-ME Corporation Security Team.",
"sources": [
{
"db": "BID",
"id": "97525"
}
],
"trust": 0.3
},
"cve": "CVE-2016-10259",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2016-10259",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "None",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2017-000099",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-89017",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.2,
"id": "CVE-2016-10259",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "IPA",
"availabilityImpact": "Low",
"baseScore": 7.2,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2017-000099",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-10259",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "IPA",
"id": "JVNDB-2017-000099",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201703-1029",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-89017",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-89017"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000099"
},
{
"db": "CNNVD",
"id": "CNNVD-201703-1029"
},
{
"db": "NVD",
"id": "CVE-2016-10259"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Symantec SSL Visibility (SSLV) 3.8.4FC, 3.9, 3.10 before 3.10.4.1, and 3.11 before 3.11.3.1 is susceptible to a denial-of-service vulnerability that impacts the SSL servers for intercepted SSL connections. A malicious SSL client can, under certain circumstances, temporarily exhaust the TCP connection pool of an SSL server. SSL Visibility Appliance provided by Blue Coat Systems, Inc. is used as a transparent proxy for encrypted traffic management. It is reported that the appliance generates RST packets with incorrect sequence numbers when it receives HTTPS requests from certain web browsers. When the web server behind the appliance fails to treat these incorrect RST packets, it keeps the encrypted session indefinitely. This behavior may be used to cause a denial-of-service (DoS) condition on the server side. According to the developer, this issue does not affect the appliance. NTT-ME CORPORATION Cyber Security Center reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.A denial-of-service (DoS) attack to a server may be conducted by an unauthenticated remote attacker. ** Delete ** This case JVNDB-2017-000099 It was removed because it was found to be duplicated. below JVNDB-2017-000099 Please refer to. \u25a0JVNDB-2017-000099 (JVN#91438377) * http://jvndb.jvn.jp/ja/contents/2017/JVNDB-2017-000099.html plural Blue Coat SSL Visibility The product contains a resource management vulnerability.Service operation interruption (DoS) An attack may be carried out. \nAttackers can exploit this issue to cause TCP connection pool exhaustion, leading to a denial-of-service condition. It supports adding SSL inspection functions to advanced threat protection solutions and existing network security architectures. A denial of service vulnerability exists in Blue Coat SSLV 3.x prior to 3.11.3.1",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-10259"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000099"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003118"
},
{
"db": "BID",
"id": "97525"
},
{
"db": "VULHUB",
"id": "VHN-89017"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-10259",
"trust": 3.6
},
{
"db": "BID",
"id": "97525",
"trust": 1.4
},
{
"db": "JVN",
"id": "JVN91438377",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000099",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003118",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201703-1029",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-89017",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-89017"
},
{
"db": "BID",
"id": "97525"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000099"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003118"
},
{
"db": "CNNVD",
"id": "CNNVD-201703-1029"
},
{
"db": "NVD",
"id": "CVE-2016-10259"
}
]
},
"id": "VAR-201704-0089",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-89017"
}
],
"trust": 0.711166
},
"last_update_date": "2024-11-23T23:05:28.183000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "SA142: Invalid TCP Packet Generation DoS in SSL Visibility",
"trust": 0.8,
"url": "https://www.symantec.com/security-center/network-protection-security-advisories/SA142"
},
{
"title": "SA142",
"trust": 0.8,
"url": "https://bto.bluecoat.com/security-advisory/sa142"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-000099"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003118"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-399",
"trust": 1.9
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-89017"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000099"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003118"
},
{
"db": "NVD",
"id": "CVE-2016-10259"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "https://bto.bluecoat.com/security-advisory/sa142"
},
{
"trust": 1.6,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-10259"
},
{
"trust": 1.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-10259"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/bid/97525"
},
{
"trust": 1.1,
"url": "https://www.symantec.com/security-center/network-protection-security-advisories/sa142"
},
{
"trust": 0.8,
"url": "http://jvn.jp/en/jp/jvn91438377/index.html"
},
{
"trust": 0.3,
"url": "https://www.bluecoat.com/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-89017"
},
{
"db": "BID",
"id": "97525"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000099"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003118"
},
{
"db": "CNNVD",
"id": "CNNVD-201703-1029"
},
{
"db": "NVD",
"id": "CVE-2016-10259"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-89017"
},
{
"db": "BID",
"id": "97525"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-000099"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003118"
},
{
"db": "CNNVD",
"id": "CNNVD-201703-1029"
},
{
"db": "NVD",
"id": "CVE-2016-10259"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-04-11T00:00:00",
"db": "VULHUB",
"id": "VHN-89017"
},
{
"date": "2017-04-07T00:00:00",
"db": "BID",
"id": "97525"
},
{
"date": "2017-05-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-000099"
},
{
"date": "2017-05-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-003118"
},
{
"date": "2017-03-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201703-1029"
},
{
"date": "2017-04-11T14:59:00.163000",
"db": "NVD",
"id": "CVE-2016-10259"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-02-24T00:00:00",
"db": "VULHUB",
"id": "VHN-89017"
},
{
"date": "2017-04-11T00:05:00",
"db": "BID",
"id": "97525"
},
{
"date": "2017-05-31T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-000099"
},
{
"date": "2017-05-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-003118"
},
{
"date": "2017-05-18T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201703-1029"
},
{
"date": "2024-11-21T02:43:40.617000",
"db": "NVD",
"id": "CVE-2016-10259"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201703-1029"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SSL Visibility Appliance may generate illegal RST packets",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-000099"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201703-1029"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.