Search criteria
1 vulnerability found for plk by huawei
VAR-201605-0333
Vulnerability from variot - Updated: 2025-04-13 23:41Cross-site scripting (XSS) vulnerability in the email APP in Huawei PLK smartphones with software AL10C00 before AL10C00B211 and AL10C92 before AL10C92B211; ATH smartphones with software AL00C00 before AL00C00B361, CL00C92 before CL00C92B361, TL00HC01 before TL00HC01B361, and UL00C00 before UL00C00B361; CherryPlus smartphones with software TL00C00 before TL00C00B553, UL00C00 before UL00C00B553, and TL00MC01 before TL00MC01B553; and RIO smartphones with software AL00C00 before AL00C00B360 allows remote attackers to inject arbitrary web script or HTML via an email message. HuaweiPLKPLK-AL10C00B211 is a smartphone product of China Huawei. Multiple Huawei Smartphones are prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected device. This may help the attacker steal cookie-based authentication credentials and launch other attacks. Huawei PLK PLK-AL10C00B211 etc. The vulnerability is caused by the program's lack of output encoding for some specific characters. The following products and versions are affected: Huawei PLK versions prior to PLK-AL10C00B211, versions prior to PLK-AL10C92B211, versions prior to ATH ATH-AL00C00B361, versions prior to ATH-CL00C92B361, versions prior to ATH-TL00HC01B361, versions prior to ATH-UL00C00B361, CherryPlus Cherry3Plus-TL00C Previous versions, versions before CherryPlus-UL00C00B553, versions before CherryPlus-TL00MC01B553, versions before RIO RIO-AL00C00B360
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201605-0333",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ath",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "cl00c92"
},
{
"model": "cherryplus",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "ul00c00"
},
{
"model": "rio",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "al00c00"
},
{
"model": "ath",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "al00c00"
},
{
"model": "cherryplus",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "tl00mc01"
},
{
"model": "cherryplus",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "tl00c00"
},
{
"model": "ath",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "ul00c00"
},
{
"model": "plk",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "al10c92"
},
{
"model": "ath",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "tl00hc01"
},
{
"model": "plk",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "al10c00"
},
{
"model": "ath",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "cherryplus",
"scope": "eq",
"trust": 1.0,
"vendor": "huawei",
"version": null
},
{
"model": "ath",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "cl00c92"
},
{
"model": "rio",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ath",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "ul00c00"
},
{
"model": "cherryplus",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "tl00mc01b553"
},
{
"model": "plk",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "al10c00"
},
{
"model": "rio",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "al00c00b360"
},
{
"model": "ath",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "al00c00b361"
},
{
"model": "cherryplus",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "tl00c00b553"
},
{
"model": "ath",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "tl00hc01b361"
},
{
"model": "plk",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ath",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "ath",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "ul00c00b361"
},
{
"model": "cherryplus",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "tl00mc01"
},
{
"model": "cherryplus",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "tl00c00"
},
{
"model": "cherryplus",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "rio",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "al00c00"
},
{
"model": "plk",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "al10c92"
},
{
"model": "cherryplus",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "ul00c00b553"
},
{
"model": "ath",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "tl00hc01"
},
{
"model": "ath",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "al00c00"
},
{
"model": "plk",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "al10c00b211"
},
{
"model": "plk",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "al10c92b211"
},
{
"model": "ath",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "cl00c92b361"
},
{
"model": "cherryplus",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "ul00c00"
},
{
"model": "glory \u003cplk-al10c00b211",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "7"
},
{
"model": "glory \u003cplk-al10c92b211",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "7"
},
{
"model": "glory 7i \u003cath-al00c00b361",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "glory 7i \u003cath-cl00c92b361",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "glory 7i \u003cath-tl00hc01b361",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "glory 7i \u003cath-ul00c00b361",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "glory play \u003ccherryplus-tl00c00b553",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "4x"
},
{
"model": "glory play \u003ccherryplus-ul00c00b553",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "4x"
},
{
"model": "glory play \u003ccherryplus-tl00mc01b553",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "4x"
},
{
"model": "\\351\\272\\246\\350\\212\\2224 \u003crio-al00c00b360",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03203"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002947"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-384"
},
{
"db": "NVD",
"id": "CVE-2016-4575"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:ath",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:ath_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:cherryplus",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:cherryplus_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:plk",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:plk_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:huawei:rio",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:rio_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-002947"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "dark clouds",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201605-384"
}
],
"trust": 0.6
},
"cve": "CVE-2016-4575",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2016-4575",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CNVD-2016-03203",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-93394",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 2.8,
"id": "CVE-2016-4575",
"impactScore": 2.7,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-4575",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2016-4575",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2016-03203",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201605-384",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-93394",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03203"
},
{
"db": "VULHUB",
"id": "VHN-93394"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002947"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-384"
},
{
"db": "NVD",
"id": "CVE-2016-4575"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cross-site scripting (XSS) vulnerability in the email APP in Huawei PLK smartphones with software AL10C00 before AL10C00B211 and AL10C92 before AL10C92B211; ATH smartphones with software AL00C00 before AL00C00B361, CL00C92 before CL00C92B361, TL00HC01 before TL00HC01B361, and UL00C00 before UL00C00B361; CherryPlus smartphones with software TL00C00 before TL00C00B553, UL00C00 before UL00C00B553, and TL00MC01 before TL00MC01B553; and RIO smartphones with software AL00C00 before AL00C00B360 allows remote attackers to inject arbitrary web script or HTML via an email message. HuaweiPLKPLK-AL10C00B211 is a smartphone product of China Huawei. Multiple Huawei Smartphones are prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected device. This may help the attacker steal cookie-based authentication credentials and launch other attacks. Huawei PLK PLK-AL10C00B211 etc. The vulnerability is caused by the program\u0027s lack of output encoding for some specific characters. The following products and versions are affected: Huawei PLK versions prior to PLK-AL10C00B211, versions prior to PLK-AL10C92B211, versions prior to ATH ATH-AL00C00B361, versions prior to ATH-CL00C92B361, versions prior to ATH-TL00HC01B361, versions prior to ATH-UL00C00B361, CherryPlus Cherry3Plus-TL00C Previous versions, versions before CherryPlus-UL00C00B553, versions before CherryPlus-TL00MC01B553, versions before RIO RIO-AL00C00B360",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-4575"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002947"
},
{
"db": "CNVD",
"id": "CNVD-2016-03203"
},
{
"db": "BID",
"id": "90307"
},
{
"db": "VULHUB",
"id": "VHN-93394"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-4575",
"trust": 3.4
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002947",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201605-384",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-03203",
"trust": 0.6
},
{
"db": "BID",
"id": "90307",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-93394",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03203"
},
{
"db": "VULHUB",
"id": "VHN-93394"
},
{
"db": "BID",
"id": "90307"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002947"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-384"
},
{
"db": "NVD",
"id": "CVE-2016-4575"
}
]
},
"id": "VAR-201605-0333",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03203"
},
{
"db": "VULHUB",
"id": "VHN-93394"
}
],
"trust": 1.7
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03203"
}
]
},
"last_update_date": "2025-04-13T23:41:18.155000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20160507-01-emailapp",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160507-01-emailapp-en"
},
{
"title": "Patches for multiple Huawei product cross-site scripting vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/75938"
},
{
"title": "Multiple Huawei Fixes for product cross-site scripting vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61700"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03203"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002947"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-384"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-79",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-93394"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002947"
},
{
"db": "NVD",
"id": "CVE-2016-4575"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.4,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160507-01-emailapp-en"
},
{
"trust": 1.2,
"url": "http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20160507-01-emailapp-cn"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4575"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4575"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03203"
},
{
"db": "VULHUB",
"id": "VHN-93394"
},
{
"db": "BID",
"id": "90307"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002947"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-384"
},
{
"db": "NVD",
"id": "CVE-2016-4575"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-03203"
},
{
"db": "VULHUB",
"id": "VHN-93394"
},
{
"db": "BID",
"id": "90307"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002947"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-384"
},
{
"db": "NVD",
"id": "CVE-2016-4575"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-05-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-03203"
},
{
"date": "2016-05-25T00:00:00",
"db": "VULHUB",
"id": "VHN-93394"
},
{
"date": "2016-05-07T00:00:00",
"db": "BID",
"id": "90307"
},
{
"date": "2016-05-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-002947"
},
{
"date": "2016-05-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201605-384"
},
{
"date": "2016-05-25T15:59:06.300000",
"db": "NVD",
"id": "CVE-2016-4575"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-05-17T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-03203"
},
{
"date": "2016-05-26T00:00:00",
"db": "VULHUB",
"id": "VHN-93394"
},
{
"date": "2016-07-06T14:41:00",
"db": "BID",
"id": "90307"
},
{
"date": "2016-05-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-002947"
},
{
"date": "2016-05-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201605-384"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-4575"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201605-384"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Smartphone software email application cross-site scripting vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-002947"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "XSS",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201605-384"
}
],
"trust": 0.6
}
}