Vulnerabilites related to huawei - e6878-870
cve-2020-9111
Vulnerability from cvelistv5
Published
2020-10-19 20:02
Modified
2024-08-04 10:19
Severity ?
EPSS score ?
Summary
E6878-370 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP21C233) and E6878-870 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP11C233) have a denial of service vulnerability. The system does not properly check some events, an attacker could launch the events continually, successful exploit could cause reboot of the process.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201014-02-dos-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | E6878-370;E6878-870 |
Version: 10.0.3.1(H557SP27C233),10.0.3.1(H563SP21C233) Version: 10.0.3.1(H557SP27C233),10.0.3.1(H563SP11C233) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.034Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201014-02-dos-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "E6878-370;E6878-870", "vendor": "n/a", "versions": [ { "status": "affected", "version": "10.0.3.1(H557SP27C233),10.0.3.1(H563SP21C233)" }, { "status": "affected", "version": "10.0.3.1(H557SP27C233),10.0.3.1(H563SP11C233)" } ] } ], "descriptions": [ { "lang": "en", "value": "E6878-370 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP21C233) and E6878-870 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP11C233) have a denial of service vulnerability. The system does not properly check some events, an attacker could launch the events continually, successful exploit could cause reboot of the process." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-19T20:02:04", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201014-02-dos-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9111", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "E6878-370;E6878-870", "version": { "version_data": [ { "version_value": "10.0.3.1(H557SP27C233),10.0.3.1(H563SP21C233)" }, { "version_value": "10.0.3.1(H557SP27C233),10.0.3.1(H563SP11C233)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "E6878-370 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP21C233) and E6878-870 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP11C233) have a denial of service vulnerability. The system does not properly check some events, an attacker could launch the events continually, successful exploit could cause reboot of the process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201014-02-dos-en", "refsource": "MISC", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201014-02-dos-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9111", "datePublished": "2020-10-19T20:02:04", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.034Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-10-19 20:15
Modified
2024-11-21 05:40
Severity ?
Summary
E6878-370 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP21C233) and E6878-870 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP11C233) have a denial of service vulnerability. The system does not properly check some events, an attacker could launch the events continually, successful exploit could cause reboot of the process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | e6878-370_firmware | 10.0.3.1\(h557sp27c233\) | |
huawei | e6878-370_firmware | 10.0.3.1\(h563sp21c233\) | |
huawei | e6878-370 | - | |
huawei | e6878-870_firmware | 10.0.3.1\(h557sp27c233\) | |
huawei | e6878-870_firmware | 10.0.3.1\(h563sp11c233\) | |
huawei | e6878-870 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:e6878-370_firmware:10.0.3.1\\(h557sp27c233\\):*:*:*:*:*:*:*", "matchCriteriaId": "DEBD99EE-8827-4F40-8C41-3917AEA25239", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:e6878-370_firmware:10.0.3.1\\(h563sp21c233\\):*:*:*:*:*:*:*", "matchCriteriaId": "7793D7FE-F4FE-4BEB-8B4F-F07759A06E9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:e6878-370:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADA263F9-F9F5-4249-A55A-748689F0271E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:e6878-870_firmware:10.0.3.1\\(h557sp27c233\\):*:*:*:*:*:*:*", "matchCriteriaId": "5636CCA2-763E-4F9D-8B18-7E48B34028C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:e6878-870_firmware:10.0.3.1\\(h563sp11c233\\):*:*:*:*:*:*:*", "matchCriteriaId": "C469017B-AED2-488A-9659-11CEEC5F2E04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:e6878-870:-:*:*:*:*:*:*:*", "matchCriteriaId": "C252DAF3-7A62-415D-B399-DB4859867DEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "E6878-370 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP21C233) and E6878-870 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP11C233) have a denial of service vulnerability. The system does not properly check some events, an attacker could launch the events continually, successful exploit could cause reboot of the process." }, { "lang": "es", "value": "E6878-370 versiones 10.0.3.1(H557SP27C233), 10.0.3.1(H563SP21C233) y E6878-870 versiones 10.0.3.1(H557SP27C233), 10.0.3.1(H563SP11C233), presentan una vulnerabilidad de denegaci\u00f3n de servicio.\u0026#xa0;El sistema no comprueba apropiadamente algunos eventos, un atacante podr\u00eda iniciar los eventos continuamente, una explotaci\u00f3n con \u00e9xito podr\u00eda causar el reinicio del proceso" } ], "id": "CVE-2020-9111", "lastModified": "2024-11-21T05:40:03.720", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 5.1, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-19T20:15:13.150", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201014-02-dos-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201014-02-dos-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-202010-1175
Vulnerability from variot
E6878-370 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP21C233) and E6878-870 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP11C233) have a denial of service vulnerability. The system does not properly check some events, an attacker could launch the events continually, successful exploit could cause reboot of the process. E6878-370 and E6878-870 Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. Huawei E6878-370 is a portable 5G router from China's Huawei (Huawei) company. The vulnerability is caused by the system's failure to check when the user processes an event. Attackers can use the vulnerability to cause the process to restart
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202010-1175", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "e6878-870", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.3.1\\(h563sp11c233\\)" }, { "model": "e6878-370", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.3.1\\(h563sp21c233\\)" }, { "model": "e6878-370", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.3.1\\(h557sp27c233\\)" }, { "model": "e6878-870", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.3.1\\(h557sp27c233\\)" }, { "model": "e6878-370", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "e6878-870", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "e6878-370", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "10.0.3.1" }, { "model": "e6878-870", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "10.0.3.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-59055" }, { "db": "JVNDB", "id": "JVNDB-2020-012670" }, { "db": "NVD", "id": "CVE-2020-9111" } ] }, "cve": "CVE-2020-9111", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.7, "confidentialityImpact": "NONE", "exploitabilityScore": 5.1, "id": "CVE-2020-9111", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.9, "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CNVD-2020-59055", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 0.9, "id": "CVE-2020-9111", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 4.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9111", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-9111", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2020-9111", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-59055", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202010-643", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-9111", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-59055" }, { "db": "VULMON", "id": "CVE-2020-9111" }, { "db": "JVNDB", "id": "JVNDB-2020-012670" }, { "db": "CNNVD", "id": "CNNVD-202010-643" }, { "db": "NVD", "id": "CVE-2020-9111" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "E6878-370 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP21C233) and E6878-870 versions 10.0.3.1(H557SP27C233),10.0.3.1(H563SP11C233) have a denial of service vulnerability. The system does not properly check some events, an attacker could launch the events continually, successful exploit could cause reboot of the process. E6878-370 and E6878-870 Contains an unspecified vulnerability.Denial of service (DoS) It may be put into a state. Huawei E6878-370 is a portable 5G router from China\u0027s Huawei (Huawei) company. The vulnerability is caused by the system\u0027s failure to check when the user processes an event. Attackers can use the vulnerability to cause the process to restart", "sources": [ { "db": "NVD", "id": "CVE-2020-9111" }, { "db": "JVNDB", "id": "JVNDB-2020-012670" }, { "db": "CNVD", "id": "CNVD-2020-59055" }, { "db": "VULMON", "id": "CVE-2020-9111" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9111", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2020-012670", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-59055", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202010-643", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-9111", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-59055" }, { "db": "VULMON", "id": "CVE-2020-9111" }, { "db": "JVNDB", "id": "JVNDB-2020-012670" }, { "db": "CNNVD", "id": "CNNVD-202010-643" }, { "db": "NVD", "id": "CVE-2020-9111" } ] }, "id": "VAR-202010-1175", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-59055" } ], "trust": 1.2666667 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-59055" } ] }, "last_update_date": "2024-11-23T22:21:00.989000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20201014-02-dos", "trust": 0.8, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201014-02-dos-en" }, { "title": "Patch for Huawei E6878-370 Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/237796" }, { "title": "Huawei E6878-370 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=131283" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-59055" }, { "db": "JVNDB", "id": "JVNDB-2020-012670" }, { "db": "CNNVD", "id": "CNNVD-202010-643" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-012670" }, { "db": "NVD", "id": "CVE-2020-9111" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201014-02-dos-en" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9111" }, { "trust": 0.6, "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20201014-02-dos-cn" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-59055" }, { "db": "VULMON", "id": "CVE-2020-9111" }, { "db": "JVNDB", "id": "JVNDB-2020-012670" }, { "db": "CNNVD", "id": "CNNVD-202010-643" }, { "db": "NVD", "id": "CVE-2020-9111" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-59055" }, { "db": "VULMON", "id": "CVE-2020-9111" }, { "db": "JVNDB", "id": "JVNDB-2020-012670" }, { "db": "CNNVD", "id": "CNNVD-202010-643" }, { "db": "NVD", "id": "CVE-2020-9111" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-27T00:00:00", "db": "CNVD", "id": "CNVD-2020-59055" }, { "date": "2020-10-19T00:00:00", "db": "VULMON", "id": "CVE-2020-9111" }, { "date": "2021-05-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-012670" }, { "date": "2020-10-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202010-643" }, { "date": "2020-10-19T20:15:13.150000", "db": "NVD", "id": "CVE-2020-9111" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-28T00:00:00", "db": "CNVD", "id": "CNVD-2020-59055" }, { "date": "2020-10-29T00:00:00", "db": "VULMON", "id": "CVE-2020-9111" }, { "date": "2021-05-20T08:24:00", "db": "JVNDB", "id": "JVNDB-2020-012670" }, { "date": "2020-10-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202010-643" }, { "date": "2024-11-21T05:40:03.720000", "db": "NVD", "id": "CVE-2020-9111" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202010-643" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "E6878-370\u00a0 and \u00a0E6878-870\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-012670" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202010-643" } ], "trust": 0.6 } }