var-201704-1024
Vulnerability from variot
Huawei Mate 8 phones with software Versions before NXT-AL10C00B386, Versions before NXT-CL00C92B386, Versions before NXT-DL00C17B386, Versions before NXT-TL00C01B386; Mate S phones with software Versions before CRR-CL00C92B368, Versions before CRR-CL20C92B368, Versions before CRR-TL00C01B368, Versions before CRR-UL00C00B368, Versions before CRR-UL20C00B368; and P8 phones with software Versions before GRA-TL00C01B366, Versions before GRA-CL00C92B366, Versions before GRA-CL10C92B366, Versions before GRA-UL00C00B366, Versions before GRA-UL10C00B366 allow attackers with graphic or Camera privilege to crash the system or escalate privilege. Huawei Mate 8 , Mate S ,and P8 Smartphones have vulnerabilities that can cause system crashes or elevated privileges.An attacker with graphic or camera privileges could crash the system or elevate privileges. HuaweiMate8, MateS, and P8 are Huawei smartphones. A number of Huawei phones have security vulnerabilities that lack parameter checking. The premise of the exploit is that the attacker gains Graphic or Camera privileges and entice the user to install a malicious application that can use the application to send specific parameters to the phone, resulting in a system reboot or user privilege escalation. Multiple Huawei Smart Phones are prone to multiple local denial-of-service vulnerabilities. Attackers can exploit these issuee to crash the application, resulting in a denial-of-service condition. The Huawei Mate 8 and others are smartphones from the Chinese company Huawei. The following devices are affected: Huawei Mate 8, Mate S, P8
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201704-1024", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mate 8", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": null }, { "model": "mate s", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": null }, { "model": "p8", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": null }, { "model": "mate 8", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "nxt-al10c00b386" }, { "model": "mate 8", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "nxt-cl00c92b386" }, { "model": "mate 8", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "nxt-dl00c17b386" }, { "model": "mate 8", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "nxt-tl00c01b386" }, { "model": "mate s", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "crr-cl00c92b368" }, { "model": "mate s", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "crr-cl20c92b368" }, { "model": "mate s", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "crr-tl00c01b368" }, { "model": "mate s", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "crr-ul00c00b368" }, { "model": "mate s", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "crr-ul20c00b368" }, { "model": "p8", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "gra-cl00c92b366" }, { "model": "p8", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "gra-cl10c92b366" }, { "model": "p8", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "gra-tl00c01b366" }, { "model": "p8", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "gra-ul00c00b366" }, { "model": "p8", "scope": "lt", "trust": 0.8, "vendor": "huawei", "version": "gra-ul10c00b366" }, { "model": "p8 \u003cgra-tl00c01b366", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "p8 \u003cgra-ul00c00b366", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "p8 \u003cgra-ul10c00b366", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "p8 \u003cgra-cl00c92b366", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "mate \u003cnxt-al10c00b386", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "8" }, { "model": "mate \u003cnxt-cl00c92b386", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "8" }, { "model": "mate \u003cnxt-dl00c17b386", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "8" }, { "model": "mate \u003cnxt-tl00c01b386", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "8" }, { "model": "mate s \u003ccrr-cl00c92b368", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "mate s \u003ccrr-cl20c92b368", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "mate s \u003ccrr-tl00c01b368", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "mate s \u003ccrr-ul00c00b368", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "mate s \u003ccrr-ul20c00b368", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "p8 \u003cgra-cl10c92b366", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "p8", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "mates", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "0" }, { "model": "mate", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "80" }, { "model": "p8 gra-ul10c00b366", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 gra-ul00c00b366", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 gra-tl00c01b366", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 gra-cl10c92b366", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "p8 gra-cl00c92b366", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mates crr-ul20c00b368", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mates crr-ul00c00b368", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mates crr-tl00c01b368", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mates crr-cl20c92b368", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mates crr-cl00c92b368", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "mate nxt-tl00c01b386", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "8" }, { "model": "mate nxt-dl00c17b386", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "8" }, { "model": "mate nxt-cl00c92b386", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "8" }, { "model": "mate nxt-al10c00b386", "scope": "ne", "trust": 0.3, "vendor": "huawei", "version": "8" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11306" }, { "db": "BID", "id": "94404" }, { "db": "JVNDB", "id": "JVNDB-2016-008224" }, { "db": "CNNVD", "id": "CNNVD-201611-467" }, { "db": "NVD", "id": "CVE-2016-8791" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:huawei:mate_8_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:mate_s_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:p8_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-008224" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Yang Chengming, Yang Chao, You Ning, Xiao Peng and Song Yang.", "sources": [ { "db": "BID", "id": "94404" }, { "db": "CNNVD", "id": "CNNVD-201611-467" } ], "trust": 0.9 }, "cve": "CVE-2016-8791", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 1.9, "id": "CVE-2016-8791", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 1.2, "confidentialityImpact": "NONE", "exploitabilityScore": 1.9, "id": "CNVD-2016-11306", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 1.9, "id": "VHN-97611", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:H/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2016-8791", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-8791", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-8791", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2016-11306", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201611-467", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-97611", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11306" }, { "db": "VULHUB", "id": "VHN-97611" }, { "db": "JVNDB", "id": "JVNDB-2016-008224" }, { "db": "CNNVD", "id": "CNNVD-201611-467" }, { "db": "NVD", "id": "CVE-2016-8791" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Mate 8 phones with software Versions before NXT-AL10C00B386, Versions before NXT-CL00C92B386, Versions before NXT-DL00C17B386, Versions before NXT-TL00C01B386; Mate S phones with software Versions before CRR-CL00C92B368, Versions before CRR-CL20C92B368, Versions before CRR-TL00C01B368, Versions before CRR-UL00C00B368, Versions before CRR-UL20C00B368; and P8 phones with software Versions before GRA-TL00C01B366, Versions before GRA-CL00C92B366, Versions before GRA-CL10C92B366, Versions before GRA-UL00C00B366, Versions before GRA-UL10C00B366 allow attackers with graphic or Camera privilege to crash the system or escalate privilege. Huawei Mate 8 , Mate S ,and P8 Smartphones have vulnerabilities that can cause system crashes or elevated privileges.An attacker with graphic or camera privileges could crash the system or elevate privileges. HuaweiMate8, MateS, and P8 are Huawei smartphones. A number of Huawei phones have security vulnerabilities that lack parameter checking. The premise of the exploit is that the attacker gains Graphic or Camera privileges and entice the user to install a malicious application that can use the application to send specific parameters to the phone, resulting in a system reboot or user privilege escalation. Multiple Huawei Smart Phones are prone to multiple local denial-of-service vulnerabilities. \nAttackers can exploit these issuee to crash the application, resulting in a denial-of-service condition. The Huawei Mate 8 and others are smartphones from the Chinese company Huawei. The following devices are affected: Huawei Mate 8, Mate S, P8", "sources": [ { "db": "NVD", "id": "CVE-2016-8791" }, { "db": "JVNDB", "id": "JVNDB-2016-008224" }, { "db": "CNVD", "id": "CNVD-2016-11306" }, { "db": "BID", "id": "94404" }, { "db": "VULHUB", "id": "VHN-97611" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-8791", "trust": 3.4 }, { "db": "BID", "id": "94404", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2016-008224", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201611-467", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2016-11306", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-97611", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11306" }, { "db": "VULHUB", "id": "VHN-97611" }, { "db": "BID", "id": "94404" }, { "db": "JVNDB", "id": "JVNDB-2016-008224" }, { "db": "CNNVD", "id": "CNNVD-201611-467" }, { "db": "NVD", "id": "CVE-2016-8791" } ] }, "id": "VAR-201704-1024", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2016-11306" }, { "db": "VULHUB", "id": "VHN-97611" } ], "trust": 1.3051551333333333 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11306" } ] }, "last_update_date": "2024-11-23T22:22:34.068000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20161116-01-smartphone", "trust": 0.8, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161116-01-smartphone-en" }, { "title": "Patches for multiple Huawei mobile phone privilege escalation vulnerabilities (CNVD-2016-11306)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/84111" }, { "title": "Multiple Huawei Fixes for mobile local denial of service vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=65805" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11306" }, { "db": "JVNDB", "id": "JVNDB-2016-008224" }, { "db": "CNNVD", "id": "CNNVD-201611-467" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-284", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-97611" }, { "db": "JVNDB", "id": "JVNDB-2016-008224" }, { "db": "NVD", "id": "CVE-2016-8791" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161116-01-smartphone-en" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/94404" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8791" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8791" }, { "trust": 0.6, "url": "http://www.huawei.com/cn/psirt/security-advisories/2016/huawei-sa-20161116-01-smartphone-cn" }, { "trust": 0.3, "url": "http://www.huawei.com" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2016-11306" }, { "db": "VULHUB", "id": "VHN-97611" }, { "db": "BID", "id": "94404" }, { "db": "JVNDB", "id": "JVNDB-2016-008224" }, { "db": "CNNVD", "id": "CNNVD-201611-467" }, { "db": "NVD", "id": "CVE-2016-8791" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2016-11306" }, { "db": "VULHUB", "id": "VHN-97611" }, { "db": "BID", "id": "94404" }, { "db": "JVNDB", "id": "JVNDB-2016-008224" }, { "db": "CNNVD", "id": "CNNVD-201611-467" }, { "db": "NVD", "id": "CVE-2016-8791" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-11-18T00:00:00", "db": "CNVD", "id": "CNVD-2016-11306" }, { "date": "2017-04-02T00:00:00", "db": "VULHUB", "id": "VHN-97611" }, { "date": "2016-11-18T00:00:00", "db": "BID", "id": "94404" }, { "date": "2017-05-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008224" }, { "date": "2016-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201611-467" }, { "date": "2017-04-02T20:59:01.673000", "db": "NVD", "id": "CVE-2016-8791" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-11-18T00:00:00", "db": "CNVD", "id": "CNVD-2016-11306" }, { "date": "2017-04-05T00:00:00", "db": "VULHUB", "id": "VHN-97611" }, { "date": "2016-11-24T01:12:00", "db": "BID", "id": "94404" }, { "date": "2017-05-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008224" }, { "date": "2016-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201611-467" }, { "date": "2024-11-21T03:00:05.057000", "db": "NVD", "id": "CVE-2016-8791" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "94404" }, { "db": "CNNVD", "id": "CNNVD-201611-467" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei Vulnerability that crashes the system on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-008224" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201611-467" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.