VAR-201708-0960
Vulnerability from variot - Updated: 2025-04-20 23:32Data corruption vulnerability in firmware in Intel Solid-State Drive Consumer, Professional, Embedded, Data Center affected firmware versions LSBG200, LSF031C, LSF036C, LBF010C, LSBG100, LSF031C, LSF036C, LBF010C, LSF031P, LSF036P, LBF010P, LSF031P, LSF036P, LBF010P, LSMG200, LSF031E, LSF036E, LSMG100, LSF031E, LSF036E, LSDG200, LSF031D, LSF036D allows local users to cause a denial of service via unspecified vectors. plural Intel The firmware contains an input validation vulnerability.Denial of service (DoS) May be in a state. Intel SSD540sSeries and so on are all different series of SSD products from Intel Corporation of the United States. There are security vulnerabilities in several Intel products
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201708-0960",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ssd 540s series m.2",
"scope": "eq",
"trust": 1.8,
"vendor": "intel",
"version": "lbf010c"
},
{
"model": "ssd 540s series m.2",
"scope": "eq",
"trust": 1.8,
"vendor": "intel",
"version": "lsbg100"
},
{
"model": "ssd 540s series m.2",
"scope": "eq",
"trust": 1.8,
"vendor": "intel",
"version": "lsf031c"
},
{
"model": "ssd 540s series m.2",
"scope": "eq",
"trust": 1.8,
"vendor": "intel",
"version": "lsf036c"
},
{
"model": "ssd e 5400s m.2",
"scope": "eq",
"trust": 1.6,
"vendor": "intel",
"version": "lsmg100"
},
{
"model": "ssd dc s3100",
"scope": "eq",
"trust": 1.6,
"vendor": "intel",
"version": "lsdg200"
},
{
"model": "ssd e 5400s m.2",
"scope": "eq",
"trust": 1.6,
"vendor": "intel",
"version": "lsf036e"
},
{
"model": "ssd dc s3100",
"scope": "eq",
"trust": 1.6,
"vendor": "intel",
"version": "lsf036d"
},
{
"model": "ssd e 5400s 2.5\\\"",
"scope": "eq",
"trust": 1.6,
"vendor": "intel",
"version": "lsf031e"
},
{
"model": "ssd e 5400s m.2",
"scope": "eq",
"trust": 1.6,
"vendor": "intel",
"version": "lsf031e"
},
{
"model": "ssd dc s3100",
"scope": "eq",
"trust": 1.6,
"vendor": "intel",
"version": "lsf031d"
},
{
"model": "ssd 540s 2.5\\\"",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "lsf036c"
},
{
"model": "ssd 540s 2.5\\\"",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "lsf031c"
},
{
"model": "ssd pro 5400s m.2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "lsf031p"
},
{
"model": "ssd pro 5400s 2.5\\\"",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "lsf036p"
},
{
"model": "ssd e 5400s 2.5\\\"",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "lsmg200"
},
{
"model": "ssd 540s 2.5\\\"",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "lsbg200"
},
{
"model": "ssd pro 5400s m.2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "lsf036p"
},
{
"model": "ssd e 5400s 2.5\\\"",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "lsf036e"
},
{
"model": "ssd pro 5400s 2.5\\\"",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "lbf010p"
},
{
"model": "ssd pro 5400s 2.5\\\"",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "lsf031p"
},
{
"model": "ssd pro 5400s m.2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": "lbf010p"
},
{
"model": "ssd 540s series 2.5\"",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lbf010c"
},
{
"model": "ssd 540s series 2.5\"",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lsbg200"
},
{
"model": "ssd 540s series 2.5\"",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lsf031c"
},
{
"model": "ssd 540s series 2.5\"",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lsf036c"
},
{
"model": "ssd dc s3100 series",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lsdg200"
},
{
"model": "ssd dc s3100 series",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lsf031d"
},
{
"model": "ssd dc s3100 series",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lsf036d"
},
{
"model": "ssd e 5400s series 2.5\"",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lsf031e"
},
{
"model": "ssd e 5400s series 2.5\"",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lsf036e"
},
{
"model": "ssd e 5400s series 2.5\"",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lsmg200"
},
{
"model": "ssd e 5400s series m.2",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lsf031e"
},
{
"model": "ssd e 5400s series m.2",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lsf036e"
},
{
"model": "ssd e 5400s series m.2",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lsmg100"
},
{
"model": "ssd pro 5400s series 2.5\"",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lbf010p"
},
{
"model": "ssd pro 5400s series 2.5\"",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lsf031p"
},
{
"model": "ssd pro 5400s series 2.5\"",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lsf036p"
},
{
"model": "ssd pro 5400s series m.2",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lbf010p"
},
{
"model": "ssd pro 5400s series m.2",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lsf031p"
},
{
"model": "ssd pro 5400s series m.2",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "lsf036p"
},
{
"model": "ssd 540s series 2.5\" lsbg200",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd 540s series 2.5\" lsf031c",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd 540s series 2.5\" lsf036c",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd 540s series 2.5\" lbf010c",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd 540s series m.2 lsbg100",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd 540s series m.2 lsf031c",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd 540s series m.2 lsf036c",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd 540s series m.2 lbf010c",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd e 5400s series 2.5\" lsf031p",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd e 5400s series 2.5\" lsf036p",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd e 5400s series 2.5\" lbf010p",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd pro 5400s series m.2 lbf010p",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd e 5400s series 2.5\" lsmg200",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd e 5400s series 2.5\" lsf031e",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd e 5400s series 2.5\" lsf036e",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd e 5400s series m.2 lsmg100",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd e 5400s series m.2 lsf031e",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd e 5400s series m.2 lsf036e",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd dc s3100 series lsdg200",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd dc s3100 series lsf031d",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "ssd dc s3100 series lsf036d",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-29224"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007276"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-444"
},
{
"db": "NVD",
"id": "CVE-2017-5695"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:intel:ssd_540s_2.5%22_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:ssd_540s_series_m.2_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:ssd_dc_s3100_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:ssd_e_5400s_2.5%22_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:ssd_e_5400s_m.2_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:ssd_pro_5400s_2.5%22_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:ssd_pro_5400s_m.2_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-007276"
}
]
},
"cve": "CVE-2017-5695",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2017-5695",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CNVD-2017-29224",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "VHN-113898",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "LOW",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 0.9,
"id": "CVE-2017-5695",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-5695",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2017-5695",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2017-29224",
"trust": 0.6,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-201708-444",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-113898",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-29224"
},
{
"db": "VULHUB",
"id": "VHN-113898"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007276"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-444"
},
{
"db": "NVD",
"id": "CVE-2017-5695"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Data corruption vulnerability in firmware in Intel Solid-State Drive Consumer, Professional, Embedded, Data Center affected firmware versions LSBG200, LSF031C, LSF036C, LBF010C, LSBG100, LSF031C, LSF036C, LBF010C, LSF031P, LSF036P, LBF010P, LSF031P, LSF036P, LBF010P, LSMG200, LSF031E, LSF036E, LSMG100, LSF031E, LSF036E, LSDG200, LSF031D, LSF036D allows local users to cause a denial of service via unspecified vectors. plural Intel The firmware contains an input validation vulnerability.Denial of service (DoS) May be in a state. Intel SSD540sSeries and so on are all different series of SSD products from Intel Corporation of the United States. There are security vulnerabilities in several Intel products",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-5695"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007276"
},
{
"db": "CNVD",
"id": "CNVD-2017-29224"
},
{
"db": "VULHUB",
"id": "VHN-113898"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-5695",
"trust": 3.1
},
{
"db": "LENOVO",
"id": "LEN-26626",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007276",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201708-444",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-29224",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-113898",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-29224"
},
{
"db": "VULHUB",
"id": "VHN-113898"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007276"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-444"
},
{
"db": "NVD",
"id": "CVE-2017-5695"
}
]
},
"id": "VAR-201708-0960",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-29224"
},
{
"db": "VULHUB",
"id": "VHN-113898"
}
],
"trust": 1.53333334
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-29224"
}
]
},
"last_update_date": "2025-04-20T23:32:06.207000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "INTEL-SA-00079",
"trust": 0.8,
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00079\u0026languageid=en-fr"
},
{
"title": "Patches for multiple Intel product denial of service vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/103297"
},
{
"title": "Multiple Intel Product security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=73905"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-29224"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007276"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-444"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-113898"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007276"
},
{
"db": "NVD",
"id": "CVE-2017-5695"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.2,
"url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00079\u0026languageid=en-fr"
},
{
"trust": 1.7,
"url": "http://support.lenovo.com/us/en/solutions/len-26626"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5695"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-5695"
},
{
"trust": 0.1,
"url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00079\u0026amp;languageid=en-fr"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-29224"
},
{
"db": "VULHUB",
"id": "VHN-113898"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007276"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-444"
},
{
"db": "NVD",
"id": "CVE-2017-5695"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-29224"
},
{
"db": "VULHUB",
"id": "VHN-113898"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-007276"
},
{
"db": "CNNVD",
"id": "CNNVD-201708-444"
},
{
"db": "NVD",
"id": "CVE-2017-5695"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-29224"
},
{
"date": "2017-08-09T00:00:00",
"db": "VULHUB",
"id": "VHN-113898"
},
{
"date": "2017-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-007276"
},
{
"date": "2017-08-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201708-444"
},
{
"date": "2017-08-09T14:29:00.263000",
"db": "NVD",
"id": "CVE-2017-5695"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-10-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-29224"
},
{
"date": "2019-04-18T00:00:00",
"db": "VULHUB",
"id": "VHN-113898"
},
{
"date": "2017-09-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-007276"
},
{
"date": "2019-04-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201708-444"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2017-5695"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201708-444"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Intel Input validation vulnerability in firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-007276"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201708-444"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…