mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
05fd4670b4
commit
58e3ad09fc
@ -1,17 +1,205 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-5235",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-5235",
|
||||
"ASSIGNER": "psirt@huawei.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Harry-AL00C, Harry-AL00C-PRELOAD, Harry-AL10B, Harry-LGRP1-CHN, Harry-TL00C, Jackman-AL00D, Jackman-L03, Jackman-L21, Jackman-L22, Jackman-L23, Johnson-AL00C, Johnson-AL00IC, Johnson-AL10C, Johnson-L21C, Johnson-L21D, Johnson-L22C, Johnson-L22D, Johnson-L23C, Johnson-L42IC, Johnson-L42IE, Johnson-L42IF, Johnson-TL00D, Johnson-TL00F, Potter-AL00C, Potter-AL10A, VOGUE-AL00A, VOGUE-AL00A-PRELOAD, VOGUE-AL10C, VOGUE-AL10C-PRELOAD, VOGUE-LGRP1-CHN, VOGUE-LGRP2-OVS, VOGUE-TL00B",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "Version"
|
||||
},
|
||||
{
|
||||
"version_value": "9.1.0.206(C00E205R3P1)"
|
||||
},
|
||||
{
|
||||
"version_value": "9.0.1.5(C735R1)"
|
||||
},
|
||||
{
|
||||
"version_value": "9.1.0.1(C00R3)"
|
||||
},
|
||||
{
|
||||
"version_value": "9.1.0.206(C00E205R3P1)"
|
||||
},
|
||||
{
|
||||
"version_value": "9.1.0.206"
|
||||
},
|
||||
{
|
||||
"version_value": "9.0.1.162(C01E160R2P3)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.170(C861)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.188(C00R2P1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.163(C605)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.160(C185)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.156(C636R2P2)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.152(C45CUSTC45D1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.162(C605)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.175(C00R2P4)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.190(C788R1P16)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.161(C675CUSTC675D1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.165(C00R1P16)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.130(C461R1P1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.130(C652CUSTC652D1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.131(C10R2P2)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.136(C432CUSTC432D1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.101(C10CUSTC10D1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.101(C432CUSTC432D1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.131(C55CUSTC55D1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.105(C185R1P1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.107(C636R2P1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.103(C652CUSTC652D1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.105(C185R2P1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.107(C636R2P1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.130(C636CUSTC636D2)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.133(C605CUSTC605D1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.155(C675R2P1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.155(C675R2P1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.110(C652CUSTC652D1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.155(C675R2P1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.100(C541CUSTC541D1)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.165(C01R1P16)"
|
||||
},
|
||||
{
|
||||
"version_value": "8.2.0.100(C541CUSTC541D1)"
|
||||
},
|
||||
{
|
||||
"version_value": "9.1.0.208(C00E205R3P1)"
|
||||
},
|
||||
{
|
||||
"version_value": "9.1.0.208(C00E205R3P1)"
|
||||
},
|
||||
{
|
||||
"version_value": "9.1.0.162(C00E160R2P1)"
|
||||
},
|
||||
{
|
||||
"version_value": "9.1.0.12(C00R1)"
|
||||
},
|
||||
{
|
||||
"version_value": "9.1.0.4(C735R1)"
|
||||
},
|
||||
{
|
||||
"version_value": "9.1.0.162(C00E160R2P1)"
|
||||
},
|
||||
{
|
||||
"version_value": "9.1.0.12(C00R1)"
|
||||
},
|
||||
{
|
||||
"version_value": "9.1.0.162"
|
||||
},
|
||||
{
|
||||
"version_value": "9.1.0.161"
|
||||
},
|
||||
{
|
||||
"version_value": "9.1.0.162(C01E160R2P1)"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "null pointer dereference"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en",
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,17 +1,61 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-5252",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2019-5252",
|
||||
"ASSIGNER": "psirt@huawei.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "n/a",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "Versions earlier than 9.1.0.131(C432E6R1P5T8),Versions earlier than 9.1.0.139(C636E6R1P5T8),Versions earlier than 9.1.0.217(C00E15R3P2T8),Versions earlier than 9.1.0.237(C432E1R3P2T8),Versions earlier than 9.1.0.237(C636E2R4P1T8),Versions earlier than 9.1.0.124(C00E112R2P10T8),Versions earlier than 9.1.0.136(C636E5R1P5T8),Versions earlier than 9.1.0.115(C00E113R1P6T8),Versions earlier than 9.1.0.122(C636E4R1P4T8),Versions earlier than 9.1.0.248(C636E5R3P1)"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Improper Authentication"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"refsource": "MISC",
|
||||
"name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-smartphone-en",
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-smartphone-en"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant."
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user