Search criteria
4 vulnerabilities found for vcn500 by huawei
VAR-201708-0156
Vulnerability from variot - Updated: 2025-04-20 23:22SQL injection vulnerability in the Operation and Maintenance Unit (OMU) in Huawei VCN500 before V100R002C00SPC201 allows remote authenticated users to execute arbitrary SQL commands via a crafted HTTP request. Huawei VCN500 Is SQL An injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Huawei VCN500 is an integrated intelligent video surveillance product from China Huawei. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Operation and Maintenance Unit (OMU) is one of the communication units used to control BSC and monitor the operation of BTS and TC. SQL injection vulnerabilities exist in the OMU module of Huawei VCN500 V100R002C00SPC200B010 and V100R002C00SPC200. The vulnerability stems from the fact that the program does not perform parameter verification on the received HTTP request message
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201708-0156",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vcn500",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r002c00spc200"
},
{
"model": "vcn500",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r002c00spc200b010"
},
{
"model": "vcn500",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r002c00spc201"
},
{
"model": "vcn500",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "vcn500 v100r002c00spc200b01",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "vcn500 v100r002c00spc200",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "vcn500 v100r002c00spc201",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08193"
},
{
"db": "BID",
"id": "78076"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007832"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-201"
},
{
"db": "NVD",
"id": "CVE-2015-8334"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:huawei:vcn500",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007832"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "78076"
}
],
"trust": 0.3
},
"cve": "CVE-2015-8334",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "CVE-2015-8334",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-08193",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-86295",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2015-8334",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-8334",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2015-8334",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2015-08193",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201512-201",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-86295",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08193"
},
{
"db": "VULHUB",
"id": "VHN-86295"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007832"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-201"
},
{
"db": "NVD",
"id": "CVE-2015-8334"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SQL injection vulnerability in the Operation and Maintenance Unit (OMU) in Huawei VCN500 before V100R002C00SPC201 allows remote authenticated users to execute arbitrary SQL commands via a crafted HTTP request. Huawei VCN500 Is SQL An injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Huawei VCN500 is an integrated intelligent video surveillance product from China Huawei. \nExploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Operation and Maintenance Unit (OMU) is one of the communication units used to control BSC and monitor the operation of BTS and TC. SQL injection vulnerabilities exist in the OMU module of Huawei VCN500 V100R002C00SPC200B010 and V100R002C00SPC200. The vulnerability stems from the fact that the program does not perform parameter verification on the received HTTP request message",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8334"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007832"
},
{
"db": "CNVD",
"id": "CNVD-2015-08193"
},
{
"db": "BID",
"id": "78076"
},
{
"db": "VULHUB",
"id": "VHN-86295"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-8334",
"trust": 3.4
},
{
"db": "BID",
"id": "78076",
"trust": 1.6
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007832",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201512-201",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-08193",
"trust": 0.6
},
{
"db": "SEEBUG",
"id": "SSVID-90157",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-86295",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08193"
},
{
"db": "VULHUB",
"id": "VHN-86295"
},
{
"db": "BID",
"id": "78076"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007832"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-201"
},
{
"db": "NVD",
"id": "CVE-2015-8334"
}
]
},
"id": "VAR-201708-0156",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08193"
},
{
"db": "VULHUB",
"id": "VHN-86295"
}
],
"trust": 1.325
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08193"
}
]
},
"last_update_date": "2025-04-20T23:22:15.226000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20151126-03-VCN500",
"trust": 0.8,
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-463072.htm"
},
{
"title": "Huawei VCN500 SQL Injection Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/68320"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08193"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007832"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-89",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-86295"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007832"
},
{
"db": "NVD",
"id": "CVE-2015-8334"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-463072.htm"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/bid/78076"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8334"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2015-8334"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
},
{
"trust": 0.3,
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-463072.htm"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08193"
},
{
"db": "VULHUB",
"id": "VHN-86295"
},
{
"db": "BID",
"id": "78076"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007832"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-201"
},
{
"db": "NVD",
"id": "CVE-2015-8334"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-08193"
},
{
"db": "VULHUB",
"id": "VHN-86295"
},
{
"db": "BID",
"id": "78076"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-007832"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-201"
},
{
"db": "NVD",
"id": "CVE-2015-8334"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-12-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-08193"
},
{
"date": "2017-08-29T00:00:00",
"db": "VULHUB",
"id": "VHN-86295"
},
{
"date": "2015-11-26T00:00:00",
"db": "BID",
"id": "78076"
},
{
"date": "2017-09-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007832"
},
{
"date": "2015-11-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201512-201"
},
{
"date": "2017-08-29T15:29:00.613000",
"db": "NVD",
"id": "CVE-2015-8334"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-12-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-08193"
},
{
"date": "2017-09-07T00:00:00",
"db": "VULHUB",
"id": "VHN-86295"
},
{
"date": "2015-11-26T00:00:00",
"db": "BID",
"id": "78076"
},
{
"date": "2017-09-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-007832"
},
{
"date": "2017-09-04T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201512-201"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2015-8334"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201512-201"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei VCN500 In SQL Injection vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-007832"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SQL injection",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201512-201"
}
],
"trust": 0.6
}
}
VAR-201601-0426
Vulnerability from variot - Updated: 2025-04-12 23:30The Operation and Maintenance Unit (OMU) in Huawei VCN500 with software before V100R002C00SPC200 does not properly invalidate the session ID when an "abnormal exit" occurs, which allows remote attackers to conduct replay attacks via the session ID. Huawei VCN500 is an integrated intelligent video surveillance product from China Huawei. Huawei VCN500 has a replay security vulnerability that allows remote attackers to submit special requests to unauthorized access systems. Huawei VCN500 is prone to a security-bypass vulnerability. Huawei VCN500 V100R002C00SPC200B010 is vulnerable. Operation and Maintenance Unit (OMU) is one of the communication units used to control BSC and monitor the operation of BTS and TC. There is a security vulnerability in the Operation and Maintenance Unit (OMU) of the Huawei VCN500 that uses software versions earlier than V100R002C00SPC200B010. The vulnerability is caused by the fact that the program does not invalidate the session ID when the user logs out abnormally
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201601-0426",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vcn500",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r002c00spc200b010"
},
{
"model": "vcn500",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "vcn500",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r002c00spc200"
},
{
"model": "vcn500 v100r002c00spc200b01",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "vcn500 v100r002c00spc200",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08196"
},
{
"db": "BID",
"id": "78044"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006729"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-203"
},
{
"db": "NVD",
"id": "CVE-2015-8331"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:vcn500",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:huawei:vcn500",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-006729"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei",
"sources": [
{
"db": "BID",
"id": "78044"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-203"
}
],
"trust": 0.9
},
"cve": "CVE-2015-8331",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2015-8331",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CNVD-2015-08196",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-86292",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.2,
"id": "CVE-2015-8331",
"impactScore": 5.2,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-8331",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2015-8331",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2015-08196",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201512-203",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-86292",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2015-8331",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08196"
},
{
"db": "VULHUB",
"id": "VHN-86292"
},
{
"db": "VULMON",
"id": "CVE-2015-8331"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006729"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-203"
},
{
"db": "NVD",
"id": "CVE-2015-8331"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Operation and Maintenance Unit (OMU) in Huawei VCN500 with software before V100R002C00SPC200 does not properly invalidate the session ID when an \"abnormal exit\" occurs, which allows remote attackers to conduct replay attacks via the session ID. Huawei VCN500 is an integrated intelligent video surveillance product from China Huawei. Huawei VCN500 has a replay security vulnerability that allows remote attackers to submit special requests to unauthorized access systems. Huawei VCN500 is prone to a security-bypass vulnerability. \nHuawei VCN500 V100R002C00SPC200B010 is vulnerable. Operation and Maintenance Unit (OMU) is one of the communication units used to control BSC and monitor the operation of BTS and TC. There is a security vulnerability in the Operation and Maintenance Unit (OMU) of the Huawei VCN500 that uses software versions earlier than V100R002C00SPC200B010. The vulnerability is caused by the fact that the program does not invalidate the session ID when the user logs out abnormally",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8331"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006729"
},
{
"db": "CNVD",
"id": "CNVD-2015-08196"
},
{
"db": "BID",
"id": "78044"
},
{
"db": "VULHUB",
"id": "VHN-86292"
},
{
"db": "VULMON",
"id": "CVE-2015-8331"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-8331",
"trust": 3.5
},
{
"db": "BID",
"id": "78044",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006729",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201512-203",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-08196",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-86292",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2015-8331",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08196"
},
{
"db": "VULHUB",
"id": "VHN-86292"
},
{
"db": "VULMON",
"id": "CVE-2015-8331"
},
{
"db": "BID",
"id": "78044"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006729"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-203"
},
{
"db": "NVD",
"id": "CVE-2015-8331"
}
]
},
"id": "VAR-201601-0426",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08196"
},
{
"db": "VULHUB",
"id": "VHN-86292"
}
],
"trust": 1.325
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08196"
}
]
},
"last_update_date": "2025-04-12T23:30:39.552000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20151126-01-VCN500",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-463067"
},
{
"title": "Huawei VCN500 security bypass vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/68322"
},
{
"title": "Huawei VCN500 Operation and Maintenance Unit Enter the fix for the verification vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59047"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08196"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006729"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-203"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-86292"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006729"
},
{
"db": "NVD",
"id": "CVE-2015-8331"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-463067.htm"
},
{
"trust": 1.3,
"url": "http://www.securityfocus.com/bid/78044"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8331"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8331"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
},
{
"trust": 0.3,
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-463067.htm"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/20.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08196"
},
{
"db": "VULHUB",
"id": "VHN-86292"
},
{
"db": "VULMON",
"id": "CVE-2015-8331"
},
{
"db": "BID",
"id": "78044"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006729"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-203"
},
{
"db": "NVD",
"id": "CVE-2015-8331"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-08196"
},
{
"db": "VULHUB",
"id": "VHN-86292"
},
{
"db": "VULMON",
"id": "CVE-2015-8331"
},
{
"db": "BID",
"id": "78044"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006729"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-203"
},
{
"db": "NVD",
"id": "CVE-2015-8331"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-12-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-08196"
},
{
"date": "2016-01-11T00:00:00",
"db": "VULHUB",
"id": "VHN-86292"
},
{
"date": "2016-01-11T00:00:00",
"db": "VULMON",
"id": "CVE-2015-8331"
},
{
"date": "2015-11-26T00:00:00",
"db": "BID",
"id": "78044"
},
{
"date": "2016-01-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-006729"
},
{
"date": "2015-11-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201512-203"
},
{
"date": "2016-01-11T15:59:04.543000",
"db": "NVD",
"id": "CVE-2015-8331"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-12-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-08196"
},
{
"date": "2016-01-11T00:00:00",
"db": "VULHUB",
"id": "VHN-86292"
},
{
"date": "2016-01-11T00:00:00",
"db": "VULMON",
"id": "CVE-2015-8331"
},
{
"date": "2015-11-26T00:00:00",
"db": "BID",
"id": "78044"
},
{
"date": "2016-01-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-006729"
},
{
"date": "2016-01-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201512-203"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-8331"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201512-203"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei VCN500 Software Operation and Maintenance Unit Vulnerable to replay attacks",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-006729"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201512-203"
}
],
"trust": 0.6
}
}
VAR-201601-0427
Vulnerability from variot - Updated: 2025-04-12 23:29The Operation and Maintenance Unit (OMU) in Huawei VCN500 with software before V100R002C00SPC200 allows remote authenticated users to change the IP address of the media server via crafted packets. IP The address may be changed. Huawei VCN500 is an integrated intelligent video surveillance product from China Huawei. Huawei VCN500 has a security vulnerability that allows remote attackers to submit special requests for denial of service attacks. Huawei VCN500 is prone to a denial-of-service vulnerability. Attackers can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. Operation and Maintenance Unit (OMU) is one of the communication units used to control BSC and monitor the operation of BTS and TC. A security vulnerability exists in the Operation and Maintenance Unit (OMU) of the Huawei VCN500 that uses software versions earlier than V100R002C00SPC200B010
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201601-0427",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vcn500",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r002c00spc200b010"
},
{
"model": "vcn500",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "vcn500",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r002c00spc200"
},
{
"model": "vcn500 v100r002c00spc200b01",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "vcn500 v100r002c00spc200",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08195"
},
{
"db": "BID",
"id": "78048"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006730"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-202"
},
{
"db": "NVD",
"id": "CVE-2015-8333"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:vcn500",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:huawei:vcn500",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-006730"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "78048"
}
],
"trust": 0.3
},
"cve": "CVE-2015-8333",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.0,
"id": "CVE-2015-8333",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-08195",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.0,
"id": "VHN-86294",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:N/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.8,
"id": "CVE-2015-8333",
"impactScore": 4.2,
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-8333",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2015-8333",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2015-08195",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201512-202",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-86294",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08195"
},
{
"db": "VULHUB",
"id": "VHN-86294"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006730"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-202"
},
{
"db": "NVD",
"id": "CVE-2015-8333"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Operation and Maintenance Unit (OMU) in Huawei VCN500 with software before V100R002C00SPC200 allows remote authenticated users to change the IP address of the media server via crafted packets. IP The address may be changed. Huawei VCN500 is an integrated intelligent video surveillance product from China Huawei. Huawei VCN500 has a security vulnerability that allows remote attackers to submit special requests for denial of service attacks. Huawei VCN500 is prone to a denial-of-service vulnerability. \nAttackers can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. Operation and Maintenance Unit (OMU) is one of the communication units used to control BSC and monitor the operation of BTS and TC. A security vulnerability exists in the Operation and Maintenance Unit (OMU) of the Huawei VCN500 that uses software versions earlier than V100R002C00SPC200B010",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8333"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006730"
},
{
"db": "CNVD",
"id": "CNVD-2015-08195"
},
{
"db": "BID",
"id": "78048"
},
{
"db": "VULHUB",
"id": "VHN-86294"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-8333",
"trust": 3.4
},
{
"db": "BID",
"id": "78048",
"trust": 1.6
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006730",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201512-202",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-08195",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-86294",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08195"
},
{
"db": "VULHUB",
"id": "VHN-86294"
},
{
"db": "BID",
"id": "78048"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006730"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-202"
},
{
"db": "NVD",
"id": "CVE-2015-8333"
}
]
},
"id": "VAR-201601-0427",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08195"
},
{
"db": "VULHUB",
"id": "VHN-86294"
}
],
"trust": 1.325
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08195"
}
]
},
"last_update_date": "2025-04-12T23:29:29.877000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20151126-02-VCN500",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-463070"
},
{
"title": "Huawei VCN500 denial of service vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/68321"
},
{
"title": "Huawei VCN500 Operation and Maintenance Unit Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59046"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08195"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006730"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-202"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-264",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-86294"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006730"
},
{
"db": "NVD",
"id": "CVE-2015-8333"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-463070.htm"
},
{
"trust": 1.2,
"url": "http://www.securityfocus.com/bid/78048"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8333"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8333"
},
{
"trust": 0.3,
"url": "http://www.huawei.com/"
},
{
"trust": 0.3,
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-463070.htm"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08195"
},
{
"db": "VULHUB",
"id": "VHN-86294"
},
{
"db": "BID",
"id": "78048"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006730"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-202"
},
{
"db": "NVD",
"id": "CVE-2015-8333"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-08195"
},
{
"db": "VULHUB",
"id": "VHN-86294"
},
{
"db": "BID",
"id": "78048"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006730"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-202"
},
{
"db": "NVD",
"id": "CVE-2015-8333"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-12-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-08195"
},
{
"date": "2016-01-11T00:00:00",
"db": "VULHUB",
"id": "VHN-86294"
},
{
"date": "2015-11-26T00:00:00",
"db": "BID",
"id": "78048"
},
{
"date": "2016-01-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-006730"
},
{
"date": "2015-11-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201512-202"
},
{
"date": "2016-01-11T15:59:05.510000",
"db": "NVD",
"id": "CVE-2015-8333"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-12-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-08195"
},
{
"date": "2016-01-12T00:00:00",
"db": "VULHUB",
"id": "VHN-86294"
},
{
"date": "2015-11-26T00:00:00",
"db": "BID",
"id": "78048"
},
{
"date": "2016-01-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-006730"
},
{
"date": "2016-01-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201512-202"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-8333"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201512-202"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei VCN500 Software Operation and Maintenance Unit Media server in IP Address change vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-006730"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201512-202"
}
],
"trust": 0.6
}
}
VAR-201601-0428
Vulnerability from variot - Updated: 2025-04-12 23:16Huawei VCN500 with software before V100R002C00SPC201 logs passwords in cleartext, which allows remote authenticated users to obtain sensitive information by triggering log generation and then reading the log. Huawei VCN500 is an integrated intelligent video surveillance product from China Huawei. Huawei VCN500 has an authentication bypass vulnerability that allows remote attackers to exploit the vulnerability to gain unauthorized access to the device. Huawei VCN500 is prone to an authentication-bypass vulnerability. The vulnerability is caused by the program recording passwords in plain text
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201601-0428",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "vcn500",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r002c00spc200b010"
},
{
"model": "vcn500",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "v100r002c00spc200"
},
{
"model": "vcn500",
"scope": null,
"trust": 1.4,
"vendor": "huawei",
"version": null
},
{
"model": "vcn500",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "v100r002c00spc201"
},
{
"model": "vcn500 v100r002c00spc200b01",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "vcn500 v100r002c00spc200",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "vcn500 v100r002c00spc201",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08192"
},
{
"db": "BID",
"id": "78095"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006731"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-200"
},
{
"db": "NVD",
"id": "CVE-2015-8335"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:vcn500",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:huawei:vcn500",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-006731"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei",
"sources": [
{
"db": "BID",
"id": "78095"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-200"
}
],
"trust": 0.9
},
"cve": "CVE-2015-8335",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "CVE-2015-8335",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CNVD-2015-08192",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.0,
"id": "VHN-86296",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2015-8335",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-8335",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2015-8335",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2015-08192",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201512-200",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-86296",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2015-8335",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08192"
},
{
"db": "VULHUB",
"id": "VHN-86296"
},
{
"db": "VULMON",
"id": "CVE-2015-8335"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006731"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-200"
},
{
"db": "NVD",
"id": "CVE-2015-8335"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei VCN500 with software before V100R002C00SPC201 logs passwords in cleartext, which allows remote authenticated users to obtain sensitive information by triggering log generation and then reading the log. Huawei VCN500 is an integrated intelligent video surveillance product from China Huawei. Huawei VCN500 has an authentication bypass vulnerability that allows remote attackers to exploit the vulnerability to gain unauthorized access to the device. Huawei VCN500 is prone to an authentication-bypass vulnerability. The vulnerability is caused by the program recording passwords in plain text",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-8335"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006731"
},
{
"db": "CNVD",
"id": "CNVD-2015-08192"
},
{
"db": "BID",
"id": "78095"
},
{
"db": "VULHUB",
"id": "VHN-86296"
},
{
"db": "VULMON",
"id": "CVE-2015-8335"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-8335",
"trust": 3.5
},
{
"db": "BID",
"id": "78095",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006731",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201512-200",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-08192",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-86296",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2015-8335",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08192"
},
{
"db": "VULHUB",
"id": "VHN-86296"
},
{
"db": "VULMON",
"id": "CVE-2015-8335"
},
{
"db": "BID",
"id": "78095"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006731"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-200"
},
{
"db": "NVD",
"id": "CVE-2015-8335"
}
]
},
"id": "VAR-201601-0428",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08192"
},
{
"db": "VULHUB",
"id": "VHN-86296"
}
],
"trust": 1.325
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08192"
}
]
},
"last_update_date": "2025-04-12T23:16:47.541000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Huawei-SA-20151126-04-VCN500",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/hw-463084"
},
{
"title": "Huawei VCN500 authentication bypass vulnerability patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/68319"
},
{
"title": "Huawei VCN500 Repair measures for information disclosure vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59045"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08192"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006731"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-200"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-86296"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006731"
},
{
"db": "NVD",
"id": "CVE-2015-8335"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-463084.htm"
},
{
"trust": 1.3,
"url": "http://www.securityfocus.com/bid/78095"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8335"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8335"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
},
{
"trust": 0.3,
"url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-463084.htm"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/200.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-08192"
},
{
"db": "VULHUB",
"id": "VHN-86296"
},
{
"db": "VULMON",
"id": "CVE-2015-8335"
},
{
"db": "BID",
"id": "78095"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006731"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-200"
},
{
"db": "NVD",
"id": "CVE-2015-8335"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-08192"
},
{
"db": "VULHUB",
"id": "VHN-86296"
},
{
"db": "VULMON",
"id": "CVE-2015-8335"
},
{
"db": "BID",
"id": "78095"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-006731"
},
{
"db": "CNNVD",
"id": "CNNVD-201512-200"
},
{
"db": "NVD",
"id": "CVE-2015-8335"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-12-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-08192"
},
{
"date": "2016-01-11T00:00:00",
"db": "VULHUB",
"id": "VHN-86296"
},
{
"date": "2016-01-11T00:00:00",
"db": "VULMON",
"id": "CVE-2015-8335"
},
{
"date": "2015-11-26T00:00:00",
"db": "BID",
"id": "78095"
},
{
"date": "2016-01-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-006731"
},
{
"date": "2015-11-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201512-200"
},
{
"date": "2016-01-11T15:59:06.700000",
"db": "NVD",
"id": "CVE-2015-8335"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-12-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-08192"
},
{
"date": "2016-01-11T00:00:00",
"db": "VULHUB",
"id": "VHN-86296"
},
{
"date": "2016-01-11T00:00:00",
"db": "VULMON",
"id": "CVE-2015-8335"
},
{
"date": "2015-11-26T00:00:00",
"db": "BID",
"id": "78095"
},
{
"date": "2016-01-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-006731"
},
{
"date": "2016-01-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201512-200"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-8335"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201512-200"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei VCN500 Vulnerabilities in which important information is obtained in software",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-006731"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201512-200"
}
],
"trust": 0.6
}
}