VAR-201704-0491

Vulnerability from variot - Updated: 2023-12-18 13:03

ION memory management module in Huawei Mate 8 phones with software NXT-AL10C00B197 and earlier versions, NXT-DL10C00B197 and earlier versions, NXT-TL10C00B197 and earlier versions, NXT-CL10C00B197 and earlier versions allows attackers to cause a denial of service (restart). HuaweiMate8 is a smartphone from China Huawei. There are local denial of service vulnerabilities in more than 8 versions of huaweimate. A local attacker could exploit the vulnerability to restart the device, resulting in a denial of service. Huawei Mate 8 is prone to a local denial-of-service vulnerability. The following versions are vulnerable: Mate 8 NXT-AL10C00B197 and prior versions are affected. Mate 8 NXT-DL10C00B197 and prior versions are affected. Mate 8 NXT-TL10C00B197 and prior versions are affected. Mate 8 NXT-CL10C00B197 and prior versions are affected. Huawei Mate 8 is a smartphone product of China's Huawei (Huawei). Attackers can exploit this vulnerability by enticing users to install malicious applications to send specific parameters to the phone, causing the system to restart

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0491",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mate 8",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "nxt-cl10c00b197"
      },
      {
        "model": "mate 8",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "nxt-dl10c00b197"
      },
      {
        "model": "mate 8",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "nxt-al10c00b197"
      },
      {
        "model": "mate 8",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "huawei",
        "version": "nxt-tl10c00b197"
      },
      {
        "model": "mate nxt-cl00c92b182",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "8"
      },
      {
        "model": "mate nxt-dl00c17b182",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "8"
      },
      {
        "model": "mate nxt-tl00c01b182",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "8"
      },
      {
        "model": "mate nxt-tl10c00b197",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "8"
      },
      {
        "model": "mate nxt-tl00c01b197",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "8"
      },
      {
        "model": "mate nxt-dl10c00b197",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "8"
      },
      {
        "model": "mate nxt-dl00c17b197",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "8"
      },
      {
        "model": "mate nxt-cl10c00b197",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "8"
      },
      {
        "model": "mate nxt-cl00c92b197",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "8"
      },
      {
        "model": "mate nxt-al10c00b197",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "8"
      },
      {
        "model": "mate nxt-al10c00b182",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "huawei",
        "version": "8"
      },
      {
        "model": "mate 8",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "nxt-al10c00b197"
      },
      {
        "model": "mate 8",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "nxt-cl10c00b197"
      },
      {
        "model": "mate 8",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "nxt-dl10c00b197"
      },
      {
        "model": "mate 8",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "huawei",
        "version": "nxt-tl10c00b197"
      },
      {
        "model": "mate nxt-tl10c00b301",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "8"
      },
      {
        "model": "mate nxt-dl10c00b301",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "8"
      },
      {
        "model": "mate nxt-cl10c00b301",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "8"
      },
      {
        "model": "mate nxt-al10c00b301",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "huawei",
        "version": "8"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-10621"
      },
      {
        "db": "BID",
        "id": "93935"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008231"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8756"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-823"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:mate_8_firmware:nxt-al10c00b197:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:mate_8_firmware:nxt-tl10c00b197:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:mate_8_firmware:nxt-dl10c00b197:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:huawei:mate_8_firmware:nxt-cl10c00b197:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:huawei:mate_8:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-8756"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Hang Zhang, Dongdong She and Zhiyun Qian from University of California, Riverside.",
    "sources": [
      {
        "db": "BID",
        "id": "93935"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-823"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2016-8756",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.1,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2016-8756",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2016-10621",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-97576",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 1.8,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 5.5,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2016-8756",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "Required",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2016-8756",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2016-10621",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201610-823",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-97576",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-10621"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97576"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008231"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8756"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-823"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "ION memory management module in Huawei Mate 8 phones with software NXT-AL10C00B197 and earlier versions, NXT-DL10C00B197 and earlier versions, NXT-TL10C00B197 and earlier versions, NXT-CL10C00B197 and earlier versions allows attackers to cause a denial of service (restart). HuaweiMate8 is a smartphone from China Huawei. There are local denial of service vulnerabilities in more than 8 versions of huaweimate. A local attacker could exploit the vulnerability to restart the device, resulting in a denial of service. Huawei Mate 8 is prone to a local denial-of-service vulnerability. \nThe following versions are vulnerable:\nMate 8 NXT-AL10C00B197 and prior versions are affected. \nMate 8 NXT-DL10C00B197 and prior versions are affected. \nMate 8 NXT-TL10C00B197 and prior versions are affected. \nMate 8 NXT-CL10C00B197 and prior versions are affected. Huawei Mate 8 is a smartphone product of China\u0027s Huawei (Huawei). Attackers can exploit this vulnerability by enticing users to install malicious applications to send specific parameters to the phone, causing the system to restart",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2016-8756"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008231"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10621"
      },
      {
        "db": "BID",
        "id": "93935"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97576"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2016-8756",
        "trust": 3.4
      },
      {
        "db": "BID",
        "id": "93935",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008231",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-823",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2016-10621",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-97576",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-10621"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97576"
      },
      {
        "db": "BID",
        "id": "93935"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008231"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8756"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-823"
      }
    ]
  },
  "id": "VAR-201704-0491",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-10621"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97576"
      }
    ],
    "trust": 1.36765326
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-10621"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:03:08.444000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "huawei-sa-20161026-01-smartphone",
        "trust": 0.8,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-smartphone-en"
      },
      {
        "title": "HuaweiMate8 Local Denial of Service Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/83540"
      },
      {
        "title": "Huawei Mate 8 Remediation measures for denial of service vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=65153"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-10621"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008231"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-823"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-97576"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008231"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8756"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.securityfocus.com/bid/93935"
      },
      {
        "trust": 2.0,
        "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-smartphone-en"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8756"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8756"
      },
      {
        "trust": 0.3,
        "url": "http://www.huawei.com"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-10621"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97576"
      },
      {
        "db": "BID",
        "id": "93935"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008231"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8756"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-823"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2016-10621"
      },
      {
        "db": "VULHUB",
        "id": "VHN-97576"
      },
      {
        "db": "BID",
        "id": "93935"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008231"
      },
      {
        "db": "NVD",
        "id": "CVE-2016-8756"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-823"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-11-04T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-10621"
      },
      {
        "date": "2017-04-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-97576"
      },
      {
        "date": "2016-10-26T00:00:00",
        "db": "BID",
        "id": "93935"
      },
      {
        "date": "2017-05-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-008231"
      },
      {
        "date": "2017-04-02T20:59:01.093000",
        "db": "NVD",
        "id": "CVE-2016-8756"
      },
      {
        "date": "2016-10-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201610-823"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-11-04T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2016-10621"
      },
      {
        "date": "2017-04-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-97576"
      },
      {
        "date": "2016-11-24T01:04:00",
        "db": "BID",
        "id": "93935"
      },
      {
        "date": "2017-05-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2016-008231"
      },
      {
        "date": "2017-04-07T19:31:40.470000",
        "db": "NVD",
        "id": "CVE-2016-8756"
      },
      {
        "date": "2016-10-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201610-823"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-823"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Huawei Mate 8 Smartphone software  ION Service operation interruption in memory management module  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2016-008231"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201610-823"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…