VAR-201606-0055

Vulnerability from variot - Updated: 2025-04-13 23:27

Huawei OceanStor 5300 V3, 5500 V3, 5600 V3, 5800 V3, 6800 V3, 18800 V3, and 18500 V3 before V300R003C10 sends the plaintext session token in the HTTP header, which allows remote attackers to conduct replay attacks and obtain sensitive information by sniffing the network. OceanStor Is HTTP Replay attack to send clear session token in header ( Replay attack ) There are vulnerabilities that can be executed and get important information.A replay attack by intercepting the network by a third party ( Replay attack ) May be executed and important information may be obtained. Huawei OceanStor 5300 and other storage products are all Huawei's Huawei products. A security vulnerability exists in several HuaweiOceanStor products. The vulnerability stems from the fact that the program sends a clear text session token in the HTTP header. A remote attacker can exploit the vulnerability by sniffing the network to implement replay attacks and obtain sensitive information. This may lead to other attacks. The following products and versions are affected: Huawei OceanStor 5300 V3, 5500 V3, 5600 V3, 5800 V3, 6800 V3, 18800 V3, and V3 versions earlier than 18500 V300R003C10

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201606-0055",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ocean stor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r002c10spc200"
      },
      {
        "model": "ocean stor",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v300r003c00spc100"
      },
      {
        "model": "oceanstor 5300 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "oceanstor 5500 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "oceanstor 5600 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "oceanstor 5800 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "oceanstor 6800 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "oceanstor oceanstor 18500 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "oceanstor oceanstor 18800 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "oceanstor",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v300r003c10"
      },
      {
        "model": "oceanstor v300r003c00spc100",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "5300"
      },
      {
        "model": "oceanstor \u003c=v300r002c10spc200",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "5300v3"
      },
      {
        "model": "oceanstor v300r003c00spc100",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "5500v3"
      },
      {
        "model": "oceanstor \u003c=v300r002c10spc200",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "5500v3"
      },
      {
        "model": "oceanstor v300r003c00spc100",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "5600v3"
      },
      {
        "model": "oceanstor \u003c=v300r002c10spc200",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "5600v3"
      },
      {
        "model": "oceanstor v300r003c00spc100",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "5800v3"
      },
      {
        "model": "oceanstor \u003c=v300r002c10spc200",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "5800v3"
      },
      {
        "model": "oceanstor v300r003c00spc100",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "6800v3"
      },
      {
        "model": "oceanstor v300r003c00spc100",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "18800v3"
      },
      {
        "model": "oceanstor v300r003c00spc100",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "18500v3"
      },
      {
        "model": "ocean stor 18500 v3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ocean stor 5600 v3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ocean stor 5800 v3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ocean stor 5300 v3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ocean stor 5500 v3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ocean stor 6800 v3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ocean stor 18800 v3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04381"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003328"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-576"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5722"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:huawei:ocean_stor_5300_v3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:ocean_stor_5500_v3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:ocean_stor_5600_v3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:ocean_stor_5800_v3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:ocean_stor_6800_v3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:ocean_stor_18500_v3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:huawei:ocean_stor_18800_v3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:huawei:ocean_stor_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003328"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported the issue.",
    "sources": [
      {
        "db": "BID",
        "id": "91472"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2016-5722",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2016-5722",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2016-04381",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-94541",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "LOW",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 3.9,
            "id": "CVE-2016-5722",
            "impactScore": 3.4,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2016-5722",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2016-5722",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-04381",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201606-576",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-94541",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04381"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94541"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003328"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-576"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5722"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei OceanStor 5300 V3, 5500 V3, 5600 V3, 5800 V3, 6800 V3, 18800 V3, and 18500 V3 before V300R003C10 sends the plaintext session token in the HTTP header, which allows remote attackers to conduct replay attacks and obtain sensitive information by sniffing the network. OceanStor Is HTTP Replay attack to send clear session token in header ( Replay attack ) There are vulnerabilities that can be executed and get important information.A replay attack by intercepting the network by a third party ( Replay attack ) May be executed and important information may be obtained. Huawei OceanStor 5300 and other storage products are all Huawei\u0027s Huawei products. A security vulnerability exists in several HuaweiOceanStor products. The vulnerability stems from the fact that the program sends a clear text session token in the HTTP header. A remote attacker can exploit the vulnerability by sniffing the network to implement replay attacks and obtain sensitive information. This may lead to other attacks. The following products and versions are affected: Huawei OceanStor 5300 V3, 5500 V3, 5600 V3, 5800 V3, 6800 V3, 18800 V3, and V3 versions earlier than 18500 V300R003C10",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-5722"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003328"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04381"
      },
      {
        "db": "BID",
        "id": "91472"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94541"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-5722",
        "trust": 3.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003328",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-576",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-04381",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "91472",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VHN-94541",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04381"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94541"
      },
      {
        "db": "BID",
        "id": "91472"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003328"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-576"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5722"
      }
    ]
  },
  "id": "VAR-201606-0055",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04381"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94541"
      }
    ],
    "trust": 1.30227275
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04381"
      }
    ]
  },
  "last_update_date": "2025-04-13T23:27:25.764000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20160615-01-oceanstor",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160615-01-oceanstor-en"
      },
      {
        "title": "Patches for the transmission of tokens in plaintext transmissions of various HuaweiOceanStor products",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/78296"
      },
      {
        "title": "Multiple Huawei OceanStor Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=62492"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04381"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003328"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-576"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-94541"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003328"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5722"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160615-01-oceanstor-en"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5722"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-5722"
      },
      {
        "trust": 0.6,
        "url": "http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20160615-01-oceanstor-cn"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04381"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94541"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003328"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-576"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5722"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-04381"
      },
      {
        "db": "VULHUB",
        "id": "VHN-94541"
      },
      {
        "db": "BID",
        "id": "91472"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003328"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-576"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-5722"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-06-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-04381"
      },
      {
        "date": "2016-06-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-94541"
      },
      {
        "date": "2016-06-28T00:00:00",
        "db": "BID",
        "id": "91472"
      },
      {
        "date": "2016-06-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-003328"
      },
      {
        "date": "2016-06-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201606-576"
      },
      {
        "date": "2016-06-24T17:59:04.597000",
        "db": "NVD",
        "id": "CVE-2016-5722"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-06-30T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-04381"
      },
      {
        "date": "2016-09-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-94541"
      },
      {
        "date": "2016-07-06T15:06:00",
        "db": "BID",
        "id": "91472"
      },
      {
        "date": "2016-06-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-003328"
      },
      {
        "date": "2016-06-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201606-576"
      },
      {
        "date": "2025-04-12T10:46:40.837000",
        "db": "NVD",
        "id": "CVE-2016-5722"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-576"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "OceanStor Vulnerable to replay attacks",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-003328"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201606-576"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…