VAR-201609-0051
Vulnerability from variot - Updated: 2025-04-13 23:14The Camera driver in Huawei Honor 4C smartphones with software CHM-UL00C00 before CHM-UL00C00B564, CHM-TL00C01 before CHM-TL00C01B564, and CHM-TL00C00 before CHM-TL00HC00B564 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application, a different vulnerability than CVE-2016-6181, CVE-2016-6182, CVE-2016-6183, and CVE-2016-6184. ( System Crash ) There is a vulnerability that could allow an attacker to change the user's state or gain privileges. CVE-2016-6181 , CVE-2016-6182 , CVE-2016-6183 ,and CVE-2016-6184 This is a different vulnerability. : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) has been identified. http://cwe.mitre.org/data/definitions/284.htmlAttackers may cause a denial of service via a crafted application. ( System Crash ) You may be placed in a state or have privileges obtained. HuaweiHonor4C (Huawei Glory 4C) is a smartphone product from China's Huawei company. The HuaweiHonor4C driver has an input validation vulnerability. An attacker can induce a user to install a malicious application and use the vulnerability to pass specific parameters to the Camera driver, causing a system reboot or user privilege escalation. Huawei Honor 4C is prone to multiple unspecified security vulnerabilities Limited information is currently available regarding these issues. We will update this BID as more information emerges. The following versions are vulnerable: Huawei Honor 4C CHM-UL00C00B535 through CHM-UL00C00B556 Huawei Honor 4C CHM-TL00C01 B535 through CHM-TL00C01B556 Huawei Honor 4C CHM-TL00HC00 B535 through CHM-TL00HC00B556
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201609-0051",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "honor 4c",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "chm-ul00c00b556"
},
{
"model": "honor 4c",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "chm-tl00c01_b535"
},
{
"model": "honor 4c",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "chm-tl00hc00_b535"
},
{
"model": "honor 4c",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "chm-tl00hc00b556"
},
{
"model": "honor 4c",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "chm-ul00c00b535"
},
{
"model": "honor 4c",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "chm-tl00c01b556"
},
{
"model": "honor 4c \u003echm-ul00c00b535,\u003cchm-ul00c00b556",
"scope": null,
"trust": 1.2,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c \u003echm-tl00c01 b535,\u003cchm-tl00c01b556",
"scope": null,
"trust": 1.2,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c \u003echm-tl00hc00 b535,\u003cchm-tl00hc00b556",
"scope": null,
"trust": 1.2,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware chm-ul00c00b564"
},
{
"model": "honor 4c",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware chm-tl00hc00b564"
},
{
"model": "honor 4c",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "firmware chm-tl00c01b564"
},
{
"model": "honor 4c",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "chm-tl00c01"
},
{
"model": "honor 4c",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "chm-tl00c00"
},
{
"model": "honor 4c",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "chm-ul00c00"
},
{
"model": "honor 4c chm-ul00c00b556",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c chm-ul00c00b535",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c chm-tl00hc00b556",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c chm-tl00hc00 b535",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c chm-tl00c01b556",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c chm-tl00c01 b535",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c chm-ul00c00b564",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c chm-tl00hc00b564",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c chm-tl00c01b564",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"db": "CNVD",
"id": "CNVD-2016-05177"
},
{
"db": "BID",
"id": "91807"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004555"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-500"
},
{
"db": "NVD",
"id": "CVE-2016-6180"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Yang Chengming, Yang Chao, You Ning, Xiao Peng and Song Yang of Alibaba Mobile Security Team.",
"sources": [
{
"db": "BID",
"id": "91807"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-500"
}
],
"trust": 0.9
},
"cve": "CVE-2016-6180",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.4,
"id": "CVE-2016-6180",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 1.9,
"id": "CNVD-2016-05173",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 1.9,
"id": "CNVD-2016-05177",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.4,
"id": "VHN-95000",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:L/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.0,
"id": "CVE-2016-6180",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-6180",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2016-6180",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2016-05173",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2016-05177",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201607-500",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-95000",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"db": "CNVD",
"id": "CNVD-2016-05177"
},
{
"db": "VULHUB",
"id": "VHN-95000"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004555"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-500"
},
{
"db": "NVD",
"id": "CVE-2016-6180"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Camera driver in Huawei Honor 4C smartphones with software CHM-UL00C00 before CHM-UL00C00B564, CHM-TL00C01 before CHM-TL00C01B564, and CHM-TL00C00 before CHM-TL00HC00B564 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application, a different vulnerability than CVE-2016-6181, CVE-2016-6182, CVE-2016-6183, and CVE-2016-6184. ( System Crash ) There is a vulnerability that could allow an attacker to change the user\u0027s state or gain privileges. CVE-2016-6181 , CVE-2016-6182 , CVE-2016-6183 ,and CVE-2016-6184 This is a different vulnerability. : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) has been identified. http://cwe.mitre.org/data/definitions/284.htmlAttackers may cause a denial of service via a crafted application. ( System Crash ) You may be placed in a state or have privileges obtained. HuaweiHonor4C (Huawei Glory 4C) is a smartphone product from China\u0027s Huawei company. The HuaweiHonor4C driver has an input validation vulnerability. An attacker can induce a user to install a malicious application and use the vulnerability to pass specific parameters to the Camera driver, causing a system reboot or user privilege escalation. Huawei Honor 4C is prone to multiple unspecified security vulnerabilities\nLimited information is currently available regarding these issues. We will update this BID as more information emerges. \nThe following versions are vulnerable:\nHuawei Honor 4C CHM-UL00C00B535 through CHM-UL00C00B556\nHuawei Honor 4C CHM-TL00C01 B535 through CHM-TL00C01B556\nHuawei Honor 4C CHM-TL00HC00 B535 through CHM-TL00HC00B556",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-6180"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004555"
},
{
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"db": "CNVD",
"id": "CNVD-2016-05177"
},
{
"db": "BID",
"id": "91807"
},
{
"db": "VULHUB",
"id": "VHN-95000"
}
],
"trust": 3.06
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-6180",
"trust": 4.2
},
{
"db": "BID",
"id": "91807",
"trust": 2.1
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004555",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201607-500",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-05173",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2016-05177",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "34729",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-95000",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"db": "CNVD",
"id": "CNVD-2016-05177"
},
{
"db": "VULHUB",
"id": "VHN-95000"
},
{
"db": "BID",
"id": "91807"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004555"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-500"
},
{
"db": "NVD",
"id": "CVE-2016-6180"
}
]
},
"id": "VAR-201609-0051",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"db": "CNVD",
"id": "CNVD-2016-05177"
},
{
"db": "VULHUB",
"id": "VHN-95000"
}
],
"trust": 2.17301588
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 1.2
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"db": "CNVD",
"id": "CNVD-2016-05177"
}
]
},
"last_update_date": "2025-04-13T23:14:14.369000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20160716-01-smartphone",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160716-01-smartphone-en"
},
{
"title": "HuaweiHonor4C driver patch for input validation vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/79493"
},
{
"title": "HuaweiHonor4C driver input verification vulnerability (CNVD-2016-05177) patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/79497"
},
{
"title": "Huawei Honor 4C Fixes for driver input verification security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=62995"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"db": "CNVD",
"id": "CNVD-2016-05177"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004555"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-500"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-284",
"trust": 1.1
},
{
"problemtype": "Inappropriate access control (CWE-284) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-95000"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004555"
},
{
"db": "NVD",
"id": "CVE-2016-6180"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.2,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160716-01-smartphone-en"
},
{
"trust": 1.8,
"url": "http://www.securityfocus.com/bid/91807"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6180"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/34729"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"db": "CNVD",
"id": "CNVD-2016-05177"
},
{
"db": "VULHUB",
"id": "VHN-95000"
},
{
"db": "BID",
"id": "91807"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004555"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-500"
},
{
"db": "NVD",
"id": "CVE-2016-6180"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"db": "CNVD",
"id": "CNVD-2016-05177"
},
{
"db": "VULHUB",
"id": "VHN-95000"
},
{
"db": "BID",
"id": "91807"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004555"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-500"
},
{
"db": "NVD",
"id": "CVE-2016-6180"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-07-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"date": "2016-07-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-05177"
},
{
"date": "2016-09-07T00:00:00",
"db": "VULHUB",
"id": "VHN-95000"
},
{
"date": "2016-07-16T00:00:00",
"db": "BID",
"id": "91807"
},
{
"date": "2016-09-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004555"
},
{
"date": "2016-07-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201607-500"
},
{
"date": "2016-09-07T19:28:04.723000",
"db": "NVD",
"id": "CVE-2016-6180"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-07-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"date": "2016-07-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-05177"
},
{
"date": "2016-09-08T00:00:00",
"db": "VULHUB",
"id": "VHN-95000"
},
{
"date": "2016-07-16T00:00:00",
"db": "BID",
"id": "91807"
},
{
"date": "2024-12-16T08:15:00",
"db": "JVNDB",
"id": "JVNDB-2016-004555"
},
{
"date": "2016-09-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201607-500"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-6180"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "91807"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-500"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei\u00a0Honor\u00a04C\u00a0 Smartphone software \u00a0Camera\u00a0 Disturbance of service by drivers \u00a0(DoS)\u00a0 Vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004555"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201607-500"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.