var-201805-1006
Vulnerability from variot

Huawei iBMC V200R002C60 have an authentication bypass vulnerability. A remote attacker with low privilege may craft specific messages to upload authentication certificate to the affected products. Due to improper validation of the upload authority, successful exploit may cause privilege elevation. plural Huawei The product contains authentication vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Huawei iBMC is a server embedded intelligent management system developed by China Huawei (Huawei). The system has the functions of remote operation and maintenance, fault diagnosis, intelligent management and standardized interface management. The vulnerability is due to the fact that the program does not verify the correct upload permission

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201805-1006",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "2488 v5",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "100r005c00"
      },
      {
        "model": "2288h v5",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "100r005c00"
      },
      {
        "model": "xh310 v3",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "100r003c00"
      },
      {
        "model": "xh321 v5",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "100r005c00"
      },
      {
        "model": "ch121 v5",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "100r001c00"
      },
      {
        "model": "ch242 v5",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "100r001c00"
      },
      {
        "model": "xh321 v3",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "100r003c00"
      },
      {
        "model": "ch121l v5",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "100r001c00"
      },
      {
        "model": "1288h v5",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "100r005c00"
      },
      {
        "model": "xh620 v3",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "100r003c00"
      },
      {
        "model": "rh2288h v3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "100r003c00"
      },
      {
        "model": "rh2288 v3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "100r003c00"
      },
      {
        "model": "ch220 v3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "100r001c00"
      },
      {
        "model": "ch121 v3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "100r001c00"
      },
      {
        "model": "rh1288 v3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "100r003c00"
      },
      {
        "model": "ch140l v3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "100r001c00"
      },
      {
        "model": "ch242 v3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "100r001c00"
      },
      {
        "model": "ch121l v3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "100r001c00"
      },
      {
        "model": "ch140 v3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "100r001c00"
      },
      {
        "model": "ch222 v3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "huawei",
        "version": "100r001c00"
      },
      {
        "model": "1288h v5",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "2288h v5",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "2488 v5",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ch121 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ch121 v5",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ch121l v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ch121l v5",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ch140 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ch140l v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ch220 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ch222 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ch242 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "ch242 v5",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rh1288 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rh2288 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "rh2288h v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "xh310 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "xh321 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "xh321 v5",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      },
      {
        "model": "xh620 v3",
        "scope": null,
        "trust": 0.8,
        "vendor": "huawei",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005039"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-342"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7941"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:huawei:1288h_v5_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:2288h_v5_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:2488_v5_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ch121_v3_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ch121_v5_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ch121l_v3_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ch121l_v5_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ch140_v3_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ch140l_v3_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ch220_v3_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ch222_v3_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ch242_v3_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:ch242_v5_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:rh1288_v3_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:rh2288_v3_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:rh2288h_v3_server_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:xh310_v3_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:xh321_v3_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:xh321_v5_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:huawei:xh620_v3_server_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005039"
      }
    ]
  },
  "cve": "CVE-2018-7941",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "CVE-2018-7941",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "VHN-137973",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2018-7941",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-7941",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2018-7941",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201805-342",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-137973",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137973"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005039"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-342"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7941"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei iBMC V200R002C60 have an authentication bypass vulnerability. A remote attacker with low privilege may craft specific messages to upload authentication certificate to the affected products. Due to improper validation of the upload authority, successful exploit may cause privilege elevation. plural Huawei The product contains authentication vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Huawei iBMC is a server embedded intelligent management system developed by China Huawei (Huawei). The system has the functions of remote operation and maintenance, fault diagnosis, intelligent management and standardized interface management. The vulnerability is due to the fact that the program does not verify the correct upload permission",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-7941"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005039"
      },
      {
        "db": "VULHUB",
        "id": "VHN-137973"
      }
    ],
    "trust": 1.71
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-7941",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005039",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-342",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-137973",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137973"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005039"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-342"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7941"
      }
    ]
  },
  "id": "VAR-201805-1006",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137973"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T21:38:56.647000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20180509-01-bypass",
        "trust": 0.8,
        "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180509-01-bypass-en"
      },
      {
        "title": "Huawei iBMC Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80004"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005039"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-342"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-287",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137973"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005039"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7941"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180509-01-bypass-en"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7941"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7941"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-137973"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005039"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-342"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7941"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-137973"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005039"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-342"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-7941"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-05-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137973"
      },
      {
        "date": "2018-07-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-005039"
      },
      {
        "date": "2018-05-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201805-342"
      },
      {
        "date": "2018-05-10T14:29:00.720000",
        "db": "NVD",
        "id": "CVE-2018-7941"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-06-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-137973"
      },
      {
        "date": "2018-07-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-005039"
      },
      {
        "date": "2018-05-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201805-342"
      },
      {
        "date": "2024-11-21T04:12:59.830000",
        "db": "NVD",
        "id": "CVE-2018-7941"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-342"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Huawei Authentication vulnerabilities in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-005039"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "authorization issue",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-342"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.