var-201710-0095
Vulnerability from variot

Huawei FusionServer rack servers RH2288 V3 with software before V100R003C00SPC603, RH2288H V3 with software before V100R003C00SPC503, XH628 V3 with software before V100R003C00SPC602, RH1288 V3 with software before V100R003C00SPC602, RH2288A V2 with software before V100R002C00SPC701, RH1288A V2 with software before V100R002C00SPC502, RH8100 V3 with software before V100R003C00SPC110, CH222 V3 with software before V100R001C00SPC161, CH220 V3 with software before V100R001C00SPC161, and CH121 V3 with software before V100R001C00SPC161 allow remote authenticated operators to change server information by leveraging failure to verify user permissions. plural Huawei FusionServer Contains a permission vulnerability.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. Huawei FusionServer RH2288 V3 is a server product of Huawei Technologies, China. The Huawei FusionServer product has a security vulnerability that allows remote attackers to submit special requests to change server information. Huawei FusionServer products are prone to multiple security-bypass vulnerabilities and a command-injection vulnerability. An attacker can exploit this issue to bypass certain security restrictions and aid in brute-force attacks or execute arbitrary commands in the context of the application; other attacks may also be possible. The following products and versions are affected: Huawei FusionServer RH2288 V3 , RH2288H V3 and XH628 V3 V100R003C00 Version, FusionServer RH1288 V3 V100R003C00SPC100 Version, FusionServer RH2288A V2 and FusionServer RH1288A V2 V100R002C00 Version, FusionServer RH8100 V3 V100R003C00 Version, FusionServer CH222 V3 , CH220 V3 and CH121 V3 V100R001C00 version

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201710-0095",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "ch121 v3",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c00"
      },
      {
        "model": "rh2288a v2",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r002c00"
      },
      {
        "model": "rh2288h v3",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "ch220 v3",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c00"
      },
      {
        "model": "rh8100 v3",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "xh628 v3",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "rh1288 v3",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00spc100"
      },
      {
        "model": "ch222 v3",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r001c00"
      },
      {
        "model": "rh1288a v2",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r002c00"
      },
      {
        "model": "rh2288 v3",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "fusionserver ch121 v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r001c00spc161"
      },
      {
        "model": "fusionserver ch220 v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r001c00spc161"
      },
      {
        "model": "fusionserver ch222 v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r001c00spc161"
      },
      {
        "model": "fusionserver rh1288 v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00spc602"
      },
      {
        "model": "fusionserver rh1288a v2",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r002c00spc502"
      },
      {
        "model": "fusionserver rh2288 v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00spc603"
      },
      {
        "model": "fusionserver rh2288a v2",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r002c00spc701"
      },
      {
        "model": "fusionserver rh2288h v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00spc503"
      },
      {
        "model": "fusionserver rh8100 v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00spc110"
      },
      {
        "model": "fusionserver xh628 v3",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "v100r003c00spc602"
      },
      {
        "model": "fusionserver rh2288",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v3"
      },
      {
        "model": "rh8100 v3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "ch121 v3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v100r001c00"
      },
      {
        "model": "rh2288 v3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "xh628 v3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "ch222 v3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v100r001c00"
      },
      {
        "model": "ch220 v3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v100r001c00"
      },
      {
        "model": "rh1288a v2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v100r002c00"
      },
      {
        "model": "rh2288h v3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v100r003c00"
      },
      {
        "model": "rh2288a v2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v100r002c00"
      },
      {
        "model": "rh1288 v3",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "huawei",
        "version": "v100r003c00spc100"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-07208"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-008026"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201510-689"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7842"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:huawei:fusionserver_ch121_v3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:huawei:fusionserver_ch220_v3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:huawei:fusionserver_ch222_v3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:huawei:fusionserver_rh1288_v3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:huawei:fusionserver_rh1288a_v2",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:huawei:fusionserver_rh2288_v3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:huawei:fusionserver_rh2288a_v2",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:huawei:fusionserver_rh2288h_v3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:huawei:fusionserver_rh8100_v3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:huawei:fusionserver_xh628_v3",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-008026"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "76836"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-7842",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "CVE-2015-7842",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 6.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2015-07208",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.5,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.0,
            "id": "VHN-85803",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:N/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 2.8,
            "id": "CVE-2015-7842",
            "impactScore": 4.2,
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2015-7842",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2015-7842",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2015-07208",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201510-689",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-85803",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-07208"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85803"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-008026"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201510-689"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7842"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei FusionServer rack servers RH2288 V3 with software before V100R003C00SPC603, RH2288H V3 with software before V100R003C00SPC503, XH628 V3 with software before V100R003C00SPC602, RH1288 V3 with software before V100R003C00SPC602, RH2288A V2 with software before V100R002C00SPC701, RH1288A V2 with software before V100R002C00SPC502, RH8100 V3 with software before V100R003C00SPC110, CH222 V3 with software before V100R001C00SPC161, CH220 V3 with software before V100R001C00SPC161, and CH121 V3 with software before V100R001C00SPC161 allow remote authenticated operators to change server information by leveraging failure to verify user permissions. plural Huawei FusionServer Contains a permission vulnerability.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. Huawei FusionServer RH2288 V3 is a server product of Huawei Technologies, China. The Huawei FusionServer product has a security vulnerability that allows remote attackers to submit special requests to change server information. Huawei FusionServer products are prone to multiple security-bypass vulnerabilities and a command-injection vulnerability. \nAn attacker can exploit this issue to bypass  certain security restrictions and aid in brute-force attacks or execute arbitrary commands in the context of the application; other  attacks may also be possible. The following products and versions are affected: Huawei FusionServer RH2288 V3 , RH2288H V3 and XH628 V3 V100R003C00 Version, FusionServer RH1288 V3 V100R003C00SPC100 Version, FusionServer RH2288A V2 and FusionServer RH1288A V2 V100R002C00 Version, FusionServer RH8100 V3 V100R003C00 Version, FusionServer CH222 V3 , CH220 V3 and CH121 V3 V100R001C00 version",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-7842"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-008026"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-07208"
      },
      {
        "db": "BID",
        "id": "76836"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85803"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-7842",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "76836",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-008026",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201510-689",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-07208",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-85803",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-07208"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85803"
      },
      {
        "db": "BID",
        "id": "76836"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-008026"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201510-689"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7842"
      }
    ]
  },
  "id": "VAR-201710-0095",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-07208"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85803"
      }
    ],
    "trust": 1.35
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-07208"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:53:41.562000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Huawei-SA-20150923-01-FusionServer",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/hw-454418"
      },
      {
        "title": "Huawei FusionServer Product Information Change Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/66226"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-07208"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-008026"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-275",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-85803"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-008026"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7842"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.securityfocus.com/bid/76836"
      },
      {
        "trust": 1.7,
        "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454418.htm"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7842"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7842"
      },
      {
        "trust": 0.3,
        "url": "http://www.huawei.com"
      },
      {
        "trust": 0.3,
        "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-456219.htm"
      },
      {
        "trust": 0.3,
        "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-454418.htm"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-07208"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85803"
      },
      {
        "db": "BID",
        "id": "76836"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-008026"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201510-689"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7842"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-07208"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85803"
      },
      {
        "db": "BID",
        "id": "76836"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-008026"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201510-689"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7842"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-11-04T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-07208"
      },
      {
        "date": "2017-10-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-85803"
      },
      {
        "date": "2015-09-23T00:00:00",
        "db": "BID",
        "id": "76836"
      },
      {
        "date": "2017-11-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-008026"
      },
      {
        "date": "2015-09-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201510-689"
      },
      {
        "date": "2017-10-10T01:30:20.500000",
        "db": "NVD",
        "id": "CVE-2015-7842"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-11-04T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-07208"
      },
      {
        "date": "2017-11-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-85803"
      },
      {
        "date": "2015-11-03T20:11:00",
        "db": "BID",
        "id": "76836"
      },
      {
        "date": "2017-11-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-008026"
      },
      {
        "date": "2015-10-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201510-689"
      },
      {
        "date": "2024-11-21T02:37:30.670000",
        "db": "NVD",
        "id": "CVE-2015-7842"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201510-689"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei FusionServer Permissions vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-008026"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown",
    "sources": [
      {
        "db": "BID",
        "id": "76836"
      }
    ],
    "trust": 0.3
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.