var-201711-0256
Vulnerability from variot

SoftCo with software V200R003C20,eSpace U1910 with software V200R003C00, V200R003C20 and V200R003C30,eSpace U1911 with software V200R003C20, V200R003C30,eSpace U1930 with software V200R003C20 and V200R003C30,eSpace U1960 with software V200R003C20, V200R003C30,eSpace U1980 with software V200R003C20, V200R003C30,eSpace U1981 with software V200R003C20 and V200R003C30 have an denial of service (DoS) vulnerability, which allow an attacker with specific permission to craft a file containing malicious data and upload it to the device to exhaust memory, causing a DoS condition. Huawei SoftCo And multiple eSpace There is a resource management vulnerability in the product software.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei SoftCo is a series of switch products from China Huawei. eSpace is a communication solution of Huawei. Multiple Huawei Products are prone to a local denial-of-service vulnerability. A local attacker can exploit this issue to cause a denial-of-service condition. The following products and versions are affected: Huawei SoftCo V200R003C20 Version; eSpace U1910 V200R003C00 Version, V200R003C20 Version, V200R003C30 Version; eSpace U1911 V200R003C20 Version, V200R003C30 Version; eSpace U1930 V200R003C20 Version, V200R003C30 Version; eSpace U1960 V200R003C20 Version, V200R003C30 Version; eSpace U1980 V200R003C20 version, V200R003C30 version; eSpace U1981 V200R003C20 version, V200R003C30 version

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201711-0256",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "espace u1911",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "espace u1930",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "espace u1960",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "espace u1980",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "espace u1981",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r003c00"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "espace u1910",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r003c30"
      },
      {
        "model": "softco",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "huawei",
        "version": "v200r003c20"
      },
      {
        "model": "softco v200r003c20",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1910 v200r003c00",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1910 v200r003c20",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1910 v200r003c30",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1911 v200r003c20",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1911 v200r003c30",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1930 v200r003c20",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1930 v200r003c30",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1960 v200r003c20",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1960 v200r003c30",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1980 v200r003c20",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1980 v200r003c30",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1981 v200r003c30",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1981 v200r003c20",
        "scope": null,
        "trust": 0.9,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "softco v200r003c30spc100",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1981 v200r003c30spc100",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1980 v200r003c30spc100",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1960 v200r003c30spc100",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1930 v200r003c30spc100",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1911 v200r003c30spc100",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "espace u1910 v200r003c30spc100",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-00516"
      },
      {
        "db": "BID",
        "id": "95382"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010598"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-254"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-2690"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:espace_u1910_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:espace_u1911_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:espace_u1930_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:espace_u1960_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:espace_u1980_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:espace_u1981_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:softco_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010598"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "95382"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2017-2690",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-2690",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2017-00516",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "VHN-110893",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.8,
            "id": "CVE-2017-2690",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-2690",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-2690",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-00516",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201701-254",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-110893",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-00516"
      },
      {
        "db": "VULHUB",
        "id": "VHN-110893"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010598"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-254"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-2690"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SoftCo with software V200R003C20,eSpace U1910 with software V200R003C00, V200R003C20 and V200R003C30,eSpace U1911 with software V200R003C20, V200R003C30,eSpace U1930 with software V200R003C20 and V200R003C30,eSpace U1960 with software V200R003C20, V200R003C30,eSpace U1980 with software V200R003C20, V200R003C30,eSpace U1981 with software V200R003C20 and V200R003C30 have an denial of service (DoS) vulnerability, which allow an attacker with specific permission to craft a file containing malicious data and upload it to the device to exhaust memory, causing a DoS condition. Huawei SoftCo And multiple eSpace There is a resource management vulnerability in the product software.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei SoftCo is a series of switch products from China Huawei. eSpace is a communication solution of Huawei. Multiple Huawei Products are prone to a local denial-of-service vulnerability. \nA local attacker can exploit this issue to cause a denial-of-service condition. The following products and versions are affected: Huawei SoftCo V200R003C20 Version; eSpace U1910 V200R003C00 Version, V200R003C20 Version, V200R003C30 Version; eSpace U1911 V200R003C20 Version, V200R003C30 Version; eSpace U1930 V200R003C20 Version, V200R003C30 Version; eSpace U1960 V200R003C20 Version, V200R003C30 Version; eSpace U1980 V200R003C20 version, V200R003C30 version; eSpace U1981 V200R003C20 version, V200R003C30 version",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-2690"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010598"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-00516"
      },
      {
        "db": "BID",
        "id": "95382"
      },
      {
        "db": "VULHUB",
        "id": "VHN-110893"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-2690",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "95382",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010598",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-254",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-00516",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-110893",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-00516"
      },
      {
        "db": "VULHUB",
        "id": "VHN-110893"
      },
      {
        "db": "BID",
        "id": "95382"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010598"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-254"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-2690"
      }
    ]
  },
  "id": "VAR-201711-0256",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-00516"
      },
      {
        "db": "VULHUB",
        "id": "VHN-110893"
      }
    ],
    "trust": 1.4217475595
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-00516"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:22:22.663000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20170111-01-parser",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170111-01-parser-en"
      },
      {
        "title": "Patches for various Huawei Product Denial of Service Vulnerabilities (CNVD-2017-00516)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/88086"
      },
      {
        "title": "Various Huawei product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66957"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-00516"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010598"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-254"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-400",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-399",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-110893"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010598"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-2690"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.securityfocus.com/bid/95382"
      },
      {
        "trust": 2.0,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170111-01-parser-en"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2690"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2690"
      },
      {
        "trust": 0.6,
        "url": "http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20170111-01-parser-cn"
      },
      {
        "trust": 0.3,
        "url": "http://www.huawei.com"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-00516"
      },
      {
        "db": "VULHUB",
        "id": "VHN-110893"
      },
      {
        "db": "BID",
        "id": "95382"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010598"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-254"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-2690"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-00516"
      },
      {
        "db": "VULHUB",
        "id": "VHN-110893"
      },
      {
        "db": "BID",
        "id": "95382"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010598"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-254"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-2690"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-01-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-00516"
      },
      {
        "date": "2017-11-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-110893"
      },
      {
        "date": "2017-01-11T00:00:00",
        "db": "BID",
        "id": "95382"
      },
      {
        "date": "2017-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-010598"
      },
      {
        "date": "2017-01-12T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201701-254"
      },
      {
        "date": "2017-11-22T19:29:00.257000",
        "db": "NVD",
        "id": "CVE-2017-2690"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-01-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-00516"
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-110893"
      },
      {
        "date": "2017-01-12T00:15:00",
        "db": "BID",
        "id": "95382"
      },
      {
        "date": "2017-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-010598"
      },
      {
        "date": "2019-10-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201701-254"
      },
      {
        "date": "2024-11-21T03:23:59.170000",
        "db": "NVD",
        "id": "CVE-2017-2690"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "95382"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-254"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei SoftCo And multiple  eSpace Resource management vulnerabilities in product software",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-010598"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "resource management error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201701-254"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.