VAR-201609-0061
Vulnerability from variot - Updated: 2025-04-13 23:14The Camera driver in Huawei Honor 4C smartphones with software CHM-UL00C00 before CHM-UL00C00B564, CHM-TL00C01 before CHM-TL00C01B564, and CHM-TL00C00 before CHM-TL00HC00B564 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application, a different vulnerability than CVE-2016-6180, CVE-2016-6181, CVE-2016-6183, and CVE-2016-6184. This vulnerability CVE-2016-6180 , CVE-2016-6181 , CVE-2016-6183 ,and CVE-2016-6184 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlDenial of service operations through a specially crafted application by an attacker ( System crash ) It may be put into a state or it may be authorized. HuaweiHonor4C (Huawei Glory 4C) is a smartphone product from China's Huawei company. The HuaweiHonor4C driver has an input validation vulnerability. An attacker can induce a user to install a malicious application and use the vulnerability to pass specific parameters to the Camera driver, causing a system reboot or user privilege escalation. Huawei Honor 4C is prone to multiple unspecified security vulnerabilities Limited information is currently available regarding these issues. We will update this BID as more information emerges. The following versions are vulnerable: Huawei Honor 4C CHM-UL00C00B535 through CHM-UL00C00B556 Huawei Honor 4C CHM-TL00C01 B535 through CHM-TL00C01B556 Huawei Honor 4C CHM-TL00HC00 B535 through CHM-TL00HC00B556
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201609-0061",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "honor 4c",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "chm-ul00c00b556"
},
{
"model": "honor 4c",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "chm-tl00c01_b535"
},
{
"model": "honor 4c",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "chm-tl00hc00_b535"
},
{
"model": "honor 4c",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "chm-tl00hc00b556"
},
{
"model": "honor 4c",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "chm-ul00c00b535"
},
{
"model": "honor 4c",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "chm-tl00c01b556"
},
{
"model": "honor 4c \u003echm-ul00c00b535,\u003cchm-ul00c00b556",
"scope": null,
"trust": 1.2,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c \u003echm-tl00c01 b535,\u003cchm-tl00c01b556",
"scope": null,
"trust": 1.2,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c \u003echm-tl00hc00 b535,\u003cchm-tl00hc00b556",
"scope": null,
"trust": 1.2,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "chm-ul00c00"
},
{
"model": "honor 4c",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "chm-tl00hc00b564"
},
{
"model": "honor 4c",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "chm-tl00c00"
},
{
"model": "honor 4c",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "chm-ul00c00b564"
},
{
"model": "honor 4c",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "chm-tl00c01"
},
{
"model": "honor 4c",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "chm-tl00c01b564"
},
{
"model": "honor 4c",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c chm-ul00c00b556",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c chm-ul00c00b535",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c chm-tl00hc00b556",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c chm-tl00hc00 b535",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c chm-tl00c01b556",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c chm-tl00c01 b535",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c chm-ul00c00b564",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c chm-tl00hc00b564",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor 4c chm-tl00c01b564",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"db": "CNVD",
"id": "CNVD-2016-05175"
},
{
"db": "BID",
"id": "91807"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004557"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-498"
},
{
"db": "NVD",
"id": "CVE-2016-6182"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:huawei:honor_4c",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:huawei:honor_4c_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004557"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Yang Chengming, Yang Chao, You Ning, Xiao Peng and Song Yang of Alibaba Mobile Security Team.",
"sources": [
{
"db": "BID",
"id": "91807"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-498"
}
],
"trust": 0.9
},
"cve": "CVE-2016-6182",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "CVE-2016-6182",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 1.9,
"id": "CNVD-2016-05173",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 1.9,
"id": "CNVD-2016-05175",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "VHN-95002",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.0,
"id": "CVE-2016-6182",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-6182",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2016-6182",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2016-05173",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2016-05175",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201607-498",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-95002",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"db": "CNVD",
"id": "CNVD-2016-05175"
},
{
"db": "VULHUB",
"id": "VHN-95002"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004557"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-498"
},
{
"db": "NVD",
"id": "CVE-2016-6182"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The Camera driver in Huawei Honor 4C smartphones with software CHM-UL00C00 before CHM-UL00C00B564, CHM-TL00C01 before CHM-TL00C01B564, and CHM-TL00C00 before CHM-TL00HC00B564 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application, a different vulnerability than CVE-2016-6180, CVE-2016-6181, CVE-2016-6183, and CVE-2016-6184. This vulnerability CVE-2016-6180 , CVE-2016-6181 , CVE-2016-6183 ,and CVE-2016-6184 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlDenial of service operations through a specially crafted application by an attacker ( System crash ) It may be put into a state or it may be authorized. HuaweiHonor4C (Huawei Glory 4C) is a smartphone product from China\u0027s Huawei company. The HuaweiHonor4C driver has an input validation vulnerability. An attacker can induce a user to install a malicious application and use the vulnerability to pass specific parameters to the Camera driver, causing a system reboot or user privilege escalation. Huawei Honor 4C is prone to multiple unspecified security vulnerabilities\nLimited information is currently available regarding these issues. We will update this BID as more information emerges. \nThe following versions are vulnerable:\nHuawei Honor 4C CHM-UL00C00B535 through CHM-UL00C00B556\nHuawei Honor 4C CHM-TL00C01 B535 through CHM-TL00C01B556\nHuawei Honor 4C CHM-TL00HC00 B535 through CHM-TL00HC00B556",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-6182"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004557"
},
{
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"db": "CNVD",
"id": "CNVD-2016-05175"
},
{
"db": "BID",
"id": "91807"
},
{
"db": "VULHUB",
"id": "VHN-95002"
}
],
"trust": 3.06
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-6182",
"trust": 3.4
},
{
"db": "BID",
"id": "91807",
"trust": 2.1
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004557",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2016-05173",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2016-05175",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "34731",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201607-498",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-95002",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"db": "CNVD",
"id": "CNVD-2016-05175"
},
{
"db": "VULHUB",
"id": "VHN-95002"
},
{
"db": "BID",
"id": "91807"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004557"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-498"
},
{
"db": "NVD",
"id": "CVE-2016-6182"
}
]
},
"id": "VAR-201609-0061",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"db": "CNVD",
"id": "CNVD-2016-05175"
},
{
"db": "VULHUB",
"id": "VHN-95002"
}
],
"trust": 2.17301588
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 1.2
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"db": "CNVD",
"id": "CNVD-2016-05175"
}
]
},
"last_update_date": "2025-04-13T23:14:14.322000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20160716-01-smartphone",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160716-01-smartphone-en"
},
{
"title": "HuaweiHonor4C driver patch for input validation vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/79493"
},
{
"title": "HuaweiHonor4C driver input verification vulnerability (CNVD-2016-05175) patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/79495"
},
{
"title": "Huawei Honor 4C Fixes for driver input verification security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=62993"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"db": "CNVD",
"id": "CNVD-2016-05175"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004557"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-498"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-284",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-95002"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004557"
},
{
"db": "NVD",
"id": "CVE-2016-6182"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.2,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160716-01-smartphone-en"
},
{
"trust": 1.8,
"url": "http://www.securityfocus.com/bid/91807"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6182"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6182"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/34731"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"db": "CNVD",
"id": "CNVD-2016-05175"
},
{
"db": "VULHUB",
"id": "VHN-95002"
},
{
"db": "BID",
"id": "91807"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004557"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-498"
},
{
"db": "NVD",
"id": "CVE-2016-6182"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"db": "CNVD",
"id": "CNVD-2016-05175"
},
{
"db": "VULHUB",
"id": "VHN-95002"
},
{
"db": "BID",
"id": "91807"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004557"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-498"
},
{
"db": "NVD",
"id": "CVE-2016-6182"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-07-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"date": "2016-07-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-05175"
},
{
"date": "2016-09-07T00:00:00",
"db": "VULHUB",
"id": "VHN-95002"
},
{
"date": "2016-07-16T00:00:00",
"db": "BID",
"id": "91807"
},
{
"date": "2016-09-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004557"
},
{
"date": "2016-07-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201607-498"
},
{
"date": "2016-09-07T19:28:06.833000",
"db": "NVD",
"id": "CVE-2016-6182"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-07-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-05173"
},
{
"date": "2016-07-22T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-05175"
},
{
"date": "2016-09-08T00:00:00",
"db": "VULHUB",
"id": "VHN-95002"
},
{
"date": "2016-07-16T00:00:00",
"db": "BID",
"id": "91807"
},
{
"date": "2016-09-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004557"
},
{
"date": "2016-09-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201607-498"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-6182"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201607-498"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei Honor 4C Smartphone software Camera Service disruption in drivers (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004557"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201607-498"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.