cve-2017-17288
Vulnerability from cvelistv5
Published
2018-02-15 16:00
Modified
2024-08-05 20:43
Severity ?
EPSS score ?
Summary
Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have an integer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted messages to the affected products. Due to insufficient input validation, successful exploit may cause integer overflow and some process abnormal.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Huawei Technologies Co., Ltd. | DP300,RP200,TE30,TE40,TE50,TE60 |
Version: DP300 V500R002C00,RP200 V500R002C00, V600R006C00,TE30 V100R001C10, V500R002C00, V600R006C00,TE40 V500R002C00, V600R006C00,TE50 V500R002C00, V600R006C00,TE60 V100R001C10, V500R002C00, V600R006C00 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:43:59.997Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180131-01-integer-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "DP300,RP200,TE30,TE40,TE50,TE60", "vendor": "Huawei Technologies Co., Ltd.", "versions": [ { "status": "affected", "version": "DP300 V500R002C00,RP200 V500R002C00, V600R006C00,TE30 V100R001C10, V500R002C00, V600R006C00,TE40 V500R002C00, V600R006C00,TE50 V500R002C00, V600R006C00,TE60 V100R001C10, V500R002C00, V600R006C00" } ] } ], "datePublic": "2018-01-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have an integer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted messages to the affected products. Due to insufficient input validation, successful exploit may cause integer overflow and some process abnormal." } ], "problemTypes": [ { "descriptions": [ { "description": "integer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-15T15:57:02", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180131-01-integer-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2017-17288", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "DP300,RP200,TE30,TE40,TE50,TE60", "version": { "version_data": [ { "version_value": "DP300 V500R002C00,RP200 V500R002C00, V600R006C00,TE30 V100R001C10, V500R002C00, V600R006C00,TE40 V500R002C00, V600R006C00,TE50 V500R002C00, V600R006C00,TE60 V100R001C10, V500R002C00, V600R006C00" } ] } } ] }, "vendor_name": "Huawei Technologies Co., Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have an integer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted messages to the affected products. Due to insufficient input validation, successful exploit may cause integer overflow and some process abnormal." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "integer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180131-01-integer-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180131-01-integer-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2017-17288", "datePublished": "2018-02-15T16:00:00", "dateReserved": "2017-12-04T00:00:00", "dateUpdated": "2024-08-05T20:43:59.997Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8871106B-D3AF-4CFB-A544-1FA411642428\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F3483B2-9EB6-4E34-900A-945C04A3160D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67731A77-1DD4-49B2-B437-2850C9583750\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98275088-2FBE-42F4-AAEC-DF02950B803D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA3EF476-42D7-4758-8DCB-373F46BF1CF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9DEA387B-4F45-438F-8086-6E80B553163C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"018039EB-7265-4B71-B462-4734FD1D0503\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDD87254-ABAD-4DFF-BC0D-2CF030063D6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"931FD3B3-A333-4277-AE55-494F5DB9F09F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45C3AF58-E030-4E12-A2FD-A4337A5021ED\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF7A4D51-314B-4A77-86A7-9C5237BC4275\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A70F8924-DC80-4D6F-BA3E-DBFE32FED788\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4F188B3-0A63-4704-9B0D-F8DF5D973FA5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"092C9FAF-8892-4E16-9C0E-BB1E3488C6C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01BC9042-0485-437F-811F-F8898B3B7EA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A29049D-F472-4772-8750-20730DA624E9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"999117E9-90C8-4E76-90B5-7D364C0B84BF\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have an integer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted messages to the affected products. Due to insufficient input validation, successful exploit may cause integer overflow and some process abnormal.\"}, {\"lang\": \"es\", \"value\": \"Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00 y V600R006C00 tienen una vulnerabilidad de desbordamiento de enteros. Un atacante remoto no autenticado podr\\u00eda enviar mensajes especialmente manipulados a los productos afectados. Dada la validaci\\u00f3n de entradas insuficiente, una explotaci\\u00f3n con \\u00e9xito podr\\u00eda provocar un desbordamiento de enteros y el funcionamiento err\\u00f3neo de algunos servicios.\"}]", "id": "CVE-2017-17288", "lastModified": "2024-11-21T03:17:45.487", "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2018-02-15T16:29:02.953", "references": "[{\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180131-01-integer-en\", \"source\": \"psirt@huawei.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180131-01-integer-en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-190\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2017-17288\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2018-02-15T16:29:02.953\",\"lastModified\":\"2024-11-21T03:17:45.487\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00, V600R006C00 have an integer overflow vulnerability. An unauthenticated, remote attacker may send specially crafted messages to the affected products. Due to insufficient input validation, successful exploit may cause integer overflow and some process abnormal.\"},{\"lang\":\"es\",\"value\":\"Huawei DP300 V500R002C00, RP200 V500R002C00, V600R006C00, TE30 V100R001C10, V500R002C00, V600R006C00, TE40 V500R002C00, V600R006C00, TE50 V500R002C00, V600R006C00, TE60 V100R001C10, V500R002C00 y V600R006C00 tienen una vulnerabilidad de desbordamiento de enteros. Un atacante remoto no autenticado podr\u00eda enviar mensajes especialmente manipulados a los productos afectados. Dada la validaci\u00f3n de entradas insuficiente, una explotaci\u00f3n con \u00e9xito podr\u00eda provocar un desbordamiento de enteros y el funcionamiento err\u00f3neo de algunos servicios.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8871106B-D3AF-4CFB-A544-1FA411642428\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F3483B2-9EB6-4E34-900A-945C04A3160D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:rp200_firmware:v500r002c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16C1ED34-BC94-4AAC-ADF4-5FCD637E5B4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:rp200_firmware:v600r006c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67731A77-1DD4-49B2-B437-2850C9583750\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:rp200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98275088-2FBE-42F4-AAEC-DF02950B803D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:te30_firmware:v100r001c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA3EF476-42D7-4758-8DCB-373F46BF1CF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:te30_firmware:v500r002c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DEA387B-4F45-438F-8086-6E80B553163C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:te30_firmware:v600r006c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"018039EB-7265-4B71-B462-4734FD1D0503\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:te30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1146F99B-5344-4CD3-AF3F-CD3FE6F6DD91\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:te40_firmware:v500r002c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDD87254-ABAD-4DFF-BC0D-2CF030063D6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:te40_firmware:v600r006c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"931FD3B3-A333-4277-AE55-494F5DB9F09F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:te40:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C3AF58-E030-4E12-A2FD-A4337A5021ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:te50_firmware:v500r002c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF7A4D51-314B-4A77-86A7-9C5237BC4275\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:te50_firmware:v600r006c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A70F8924-DC80-4D6F-BA3E-DBFE32FED788\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:te50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4F188B3-0A63-4704-9B0D-F8DF5D973FA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"092C9FAF-8892-4E16-9C0E-BB1E3488C6C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01BC9042-0485-437F-811F-F8898B3B7EA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A29049D-F472-4772-8750-20730DA624E9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"999117E9-90C8-4E76-90B5-7D364C0B84BF\"}]}]}],\"references\":[{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180131-01-integer-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180131-01-integer-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.