diff --git a/2020/11xxx/CVE-2020-11579.json b/2020/11xxx/CVE-2020-11579.json index bf42c23a685..2fc3a07b892 100644 --- a/2020/11xxx/CVE-2020-11579.json +++ b/2020/11xxx/CVE-2020-11579.json @@ -52,11 +52,6 @@ }, "references": { "reference_data": [ - { - "url": "https://www.knowledgebase-script.com/", - "refsource": "MISC", - "name": "https://www.knowledgebase-script.com/" - }, { "url": "https://shielder.it/", "refsource": "MISC", @@ -71,6 +66,11 @@ "refsource": "MISC", "name": "https://www.shielder.it/blog/mysql-and-cve-2020-11579-exploitation/", "url": "https://www.shielder.it/blog/mysql-and-cve-2020-11579-exploitation/" + }, + { + "refsource": "MISC", + "name": "https://www.phpkb.com", + "url": "https://www.phpkb.com" } ] } diff --git a/2021/46xxx/CVE-2021-46811.json b/2021/46xxx/CVE-2021-46811.json index 550cd60cabb..32b3da618a5 100644 --- a/2021/46xxx/CVE-2021-46811.json +++ b/2021/46xxx/CVE-2021-46811.json @@ -1,17 +1,113 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46811", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HarmonyOS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.0" + } + ] + } + }, + { + "product_name": "EMUI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "10.1.0" + }, + { + "version_affected": "=", + "version_value": "10.1.1" + }, + { + "version_affected": "=", + "version_value": "11.0.0" + }, + { + "version_affected": "=", + "version_value": "12.0.0" + }, + { + "version_affected": "=", + "version_value": "11.0.1" + } + ] + } + }, + { + "product_name": "Magic UI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.1.0" + }, + { + "version_affected": "=", + "version_value": "3.1.1" + }, + { + "version_affected": "=", + "version_value": "4.0.0" + } + ] + } + } + ] + }, + "vendor_name": "Huawei" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper permission management vulnerability" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/", + "refsource": "MISC", + "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", + "refsource": "MISC", + "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } diff --git a/2021/46xxx/CVE-2021-46812.json b/2021/46xxx/CVE-2021-46812.json index ef0e431ee24..5f9e8480d32 100644 --- a/2021/46xxx/CVE-2021-46812.json +++ b/2021/46xxx/CVE-2021-46812.json @@ -1,17 +1,78 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46812", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HarmonyOS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.0" + } + ] + } + }, + { + "product_name": "EMUI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "12.0.0" + } + ] + } + } + ] + }, + "vendor_name": "Huawei" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Device Manager has a vulnerability in multi-device interaction. Successful exploitation of this vulnerability may affect data integrity." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Weaknesses Introduced During Design" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/", + "refsource": "MISC", + "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", + "refsource": "MISC", + "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } diff --git a/2021/46xxx/CVE-2021-46813.json b/2021/46xxx/CVE-2021-46813.json index 76230b6a634..2f4d29b0018 100644 --- a/2021/46xxx/CVE-2021-46813.json +++ b/2021/46xxx/CVE-2021-46813.json @@ -1,17 +1,73 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46813", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "EMUI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "11.0.0" + } + ] + } + }, + { + "product_name": "Magic UI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.0.0" + } + ] + } + } + ] + }, + "vendor_name": "Huawei" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vulnerability of residual files not being deleted after an update in the ChinaDRM module. Successful exploitation of this vulnerability may affect availability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Weaknesses Introduced During Design" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/", + "refsource": "MISC", + "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ] } diff --git a/2021/46xxx/CVE-2021-46815.json b/2021/46xxx/CVE-2021-46815.json index 4fa69528e8e..5395aa64dbf 100644 --- a/2021/46xxx/CVE-2021-46815.json +++ b/2021/46xxx/CVE-2021-46815.json @@ -1,17 +1,93 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46815", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "EMUI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "10.0.0" + }, + { + "version_affected": "=", + "version_value": "10.1.0" + }, + { + "version_affected": "=", + "version_value": "10.1.1" + }, + { + "version_affected": "=", + "version_value": "12.0.0" + } + ] + } + }, + { + "product_name": "Magic UI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.0.0" + }, + { + "version_affected": "=", + "version_value": "3.1.0" + }, + { + "version_affected": "=", + "version_value": "3.1.1" + } + ] + } + } + ] + }, + "vendor_name": "Huawei" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Configuration defects in the secure OS module. Successful exploitation of this vulnerability can affect availability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Configuration defectsl vulnerability" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/", + "refsource": "MISC", + "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ] } diff --git a/2022/1xxx/CVE-2022-1678.json b/2022/1xxx/CVE-2022-1678.json index a0d984c2b69..1c8c87d3cc8 100644 --- a/2022/1xxx/CVE-2022-1678.json +++ b/2022/1xxx/CVE-2022-1678.json @@ -92,6 +92,16 @@ "name": "https://gitee.com/anolis/cloud-kernel/commit/bed537da691b", "refsource": "MISC", "url": "https://gitee.com/anolis/cloud-kernel/commit/bed537da691b" + }, + { + "name": "https://anas.openanolis.cn/cves/detail/CVE-2022-1678", + "refsource": "MISC", + "url": "https://anas.openanolis.cn/cves/detail/CVE-2022-1678" + }, + { + "name": "https://anas.openanolis.cn/errata/detail/ANSA-2022:0143", + "refsource": "MISC", + "url": "https://anas.openanolis.cn/errata/detail/ANSA-2022:0143" } ] } diff --git a/2022/27xxx/CVE-2022-27805.json b/2022/27xxx/CVE-2022-27805.json new file mode 100644 index 00000000000..d2e803a279f --- /dev/null +++ b/2022/27xxx/CVE-2022-27805.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-27805", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/28xxx/CVE-2022-28710.json b/2022/28xxx/CVE-2022-28710.json new file mode 100644 index 00000000000..6e3386ef1f7 --- /dev/null +++ b/2022/28xxx/CVE-2022-28710.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-28710", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/29xxx/CVE-2022-29793.json b/2022/29xxx/CVE-2022-29793.json index e6410a94987..093e5d820cc 100644 --- a/2022/29xxx/CVE-2022-29793.json +++ b/2022/29xxx/CVE-2022-29793.json @@ -1,55 +1,41 @@ { + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", "CVE_data_meta": { - "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-29793", + "ASSIGNER": "psirt@huawei.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { + "vendor_name": "n/a", "product": { "product_data": [ { - "product_name": "HarmonyOS", + "product_name": "HarmonyOS;EMUI;Magic UI", "version": { "version_data": [ { - "version_affected": "=", - "version_value": "2.0" - } - ] - } - }, - { - "product_name": "EMUI", - "version": { - "version_data": [ + "version_value": "HarmonyOS 2.0" + }, { - "version_affected": "=", - "version_value": "12.0.0" + "version_value": "EMUI 12.0.0, EMUI 10.1.0, EMUI 10.1.1" + }, + { + "version_value": "Magic UI 3.1.0, Magic UI 3.1.1" } ] } } ] - }, - "vendor_name": "Huawei" + } } ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "There is a configuration defect in the activation lock of mobile phones.Successful exploitation of this vulnerability may affect application availability." - } - ] - }, "problemtype": { "problemtype_data": [ { @@ -65,14 +51,27 @@ "references": { "reference_data": [ { - "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", - "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/" + "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", + "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { - "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", - "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" + "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" + }, + { + "refsource": "MISC", + "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", + "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" + } + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "There is a configuration defect in the activation lock of mobile phones.Successful exploitation of this vulnerability may affect application availability." } ] } diff --git a/2022/2xxx/CVE-2022-2069.json b/2022/2xxx/CVE-2022-2069.json new file mode 100644 index 00000000000..f1df0262f85 --- /dev/null +++ b/2022/2xxx/CVE-2022-2069.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-2069", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/30xxx/CVE-2022-30547.json b/2022/30xxx/CVE-2022-30547.json new file mode 100644 index 00000000000..2c73406dc38 --- /dev/null +++ b/2022/30xxx/CVE-2022-30547.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-30547", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/31xxx/CVE-2022-31752.json b/2022/31xxx/CVE-2022-31752.json index 585dc68ee03..534825fbac6 100644 --- a/2022/31xxx/CVE-2022-31752.json +++ b/2022/31xxx/CVE-2022-31752.json @@ -1,17 +1,97 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31752", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "EMUI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "10.1.0" + }, + { + "version_affected": "=", + "version_value": "10.1.1" + }, + { + "version_affected": "=", + "version_value": "11.0.0" + }, + { + "version_affected": "=", + "version_value": "12.0.0" + }, + { + "version_affected": "=", + "version_value": "11.0.1" + } + ] + } + }, + { + "product_name": "Magic UI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.1.0" + }, + { + "version_affected": "=", + "version_value": "3.1.1" + }, + { + "version_affected": "=", + "version_value": "4.0.0" + } + ] + } + } + ] + }, + "vendor_name": "Huawei" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Missing authorization vulnerability in the system components. Successful exploitation of this vulnerability will affect confidentiality." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Missing authorization vulnerability" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/", + "refsource": "MISC", + "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ] } diff --git a/2022/31xxx/CVE-2022-31753.json b/2022/31xxx/CVE-2022-31753.json index df87b661682..b024b03eb6f 100644 --- a/2022/31xxx/CVE-2022-31753.json +++ b/2022/31xxx/CVE-2022-31753.json @@ -1,17 +1,113 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31753", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HarmonyOS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.0" + } + ] + } + }, + { + "product_name": "EMUI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "10.1.0" + }, + { + "version_affected": "=", + "version_value": "10.1.1" + }, + { + "version_affected": "=", + "version_value": "11.0.0" + }, + { + "version_affected": "=", + "version_value": "12.0.0" + }, + { + "version_affected": "=", + "version_value": "11.0.1" + } + ] + } + }, + { + "product_name": "Magic UI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.1.0" + }, + { + "version_affected": "=", + "version_value": "3.1.1" + }, + { + "version_affected": "=", + "version_value": "4.0.0" + } + ] + } + } + ] + }, + "vendor_name": "Huawei" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Weaknesses Introduced During Design" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/", + "refsource": "MISC", + "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", + "refsource": "MISC", + "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } diff --git a/2022/31xxx/CVE-2022-31754.json b/2022/31xxx/CVE-2022-31754.json index 9d6f38fd15e..54e0b35b640 100644 --- a/2022/31xxx/CVE-2022-31754.json +++ b/2022/31xxx/CVE-2022-31754.json @@ -1,17 +1,77 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31754", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "EMUI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "12.0.0" + }, + { + "version_affected": "=", + "version_value": "10.1.0" + } + ] + } + }, + { + "product_name": "Magic UI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.1.0" + } + ] + } + } + ] + }, + "vendor_name": "Huawei" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Logical defects in code implementation in some products. Successful exploitation of this vulnerability may affect the availability of some features." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Logical defects vulnerability" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/", + "refsource": "MISC", + "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ] } diff --git a/2022/31xxx/CVE-2022-31757.json b/2022/31xxx/CVE-2022-31757.json index 181779f5376..cf430500fe6 100644 --- a/2022/31xxx/CVE-2022-31757.json +++ b/2022/31xxx/CVE-2022-31757.json @@ -1,17 +1,113 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31757", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HarmonyOS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.0" + } + ] + } + }, + { + "product_name": "EMUI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "10.1.0" + }, + { + "version_affected": "=", + "version_value": "10.1.1" + }, + { + "version_affected": "=", + "version_value": "11.0.0" + }, + { + "version_affected": "=", + "version_value": "12.0.0" + }, + { + "version_affected": "=", + "version_value": "11.0.1" + } + ] + } + }, + { + "product_name": "Magic UI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.1.0" + }, + { + "version_affected": "=", + "version_value": "3.1.1" + }, + { + "version_affected": "=", + "version_value": "4.0.0" + } + ] + } + } + ] + }, + "vendor_name": "Huawei" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper use of APIs vulnerability" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/", + "refsource": "MISC", + "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", + "refsource": "MISC", + "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } diff --git a/2022/31xxx/CVE-2022-31760.json b/2022/31xxx/CVE-2022-31760.json index 9fb64be9519..3f7bcde710d 100644 --- a/2022/31xxx/CVE-2022-31760.json +++ b/2022/31xxx/CVE-2022-31760.json @@ -1,17 +1,109 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31760", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "HarmonyOS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.0" + } + ] + } + }, + { + "product_name": "EMUI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "10.1.0" + }, + { + "version_affected": "=", + "version_value": "10.1.1" + }, + { + "version_affected": "=", + "version_value": "11.0.0" + }, + { + "version_affected": "=", + "version_value": "12.0.0" + } + ] + } + }, + { + "product_name": "Magic UI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.1.0" + }, + { + "version_affected": "=", + "version_value": "3.1.1" + }, + { + "version_affected": "=", + "version_value": "4.0.0" + } + ] + } + } + ] + }, + "vendor_name": "Huawei" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Weaknesses Introduced During Design" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/", + "refsource": "MISC", + "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/" + }, + { + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", + "refsource": "MISC", + "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } diff --git a/2022/31xxx/CVE-2022-31761.json b/2022/31xxx/CVE-2022-31761.json index 018d4ce2db0..b84aa039901 100644 --- a/2022/31xxx/CVE-2022-31761.json +++ b/2022/31xxx/CVE-2022-31761.json @@ -1,17 +1,81 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31761", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "EMUI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "10.1.1" + }, + { + "version_affected": "=", + "version_value": "11.0.0" + } + ] + } + }, + { + "product_name": "Magic UI", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.1.1" + }, + { + "version_affected": "=", + "version_value": "4.0.0" + } + ] + } + } + ] + }, + "vendor_name": "Huawei" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Configuration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Configuration defectsl vulnerability" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/", + "refsource": "MISC", + "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ] } diff --git a/2022/32xxx/CVE-2022-32572.json b/2022/32xxx/CVE-2022-32572.json new file mode 100644 index 00000000000..11af0ee5a7c --- /dev/null +++ b/2022/32xxx/CVE-2022-32572.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-32572", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/32xxx/CVE-2022-32761.json b/2022/32xxx/CVE-2022-32761.json new file mode 100644 index 00000000000..e3224e854b6 --- /dev/null +++ b/2022/32xxx/CVE-2022-32761.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-32761", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33147.json b/2022/33xxx/CVE-2022-33147.json new file mode 100644 index 00000000000..3ef47ec76fc --- /dev/null +++ b/2022/33xxx/CVE-2022-33147.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33147", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33148.json b/2022/33xxx/CVE-2022-33148.json new file mode 100644 index 00000000000..efb89af293c --- /dev/null +++ b/2022/33xxx/CVE-2022-33148.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33148", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33149.json b/2022/33xxx/CVE-2022-33149.json new file mode 100644 index 00000000000..f05bd2fd39a --- /dev/null +++ b/2022/33xxx/CVE-2022-33149.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33149", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33152.json b/2022/33xxx/CVE-2022-33152.json new file mode 100644 index 00000000000..452b6c51588 --- /dev/null +++ b/2022/33xxx/CVE-2022-33152.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33152", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2022/33xxx/CVE-2022-33153.json b/2022/33xxx/CVE-2022-33153.json new file mode 100644 index 00000000000..0b911486b56 --- /dev/null +++ b/2022/33xxx/CVE-2022-33153.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2022-33153", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file