{"vulnerability": "CVE-2022-4631", "sightings": [{"uuid": "fe3eb853-999d-4855-8718-125070dea3d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46311", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12230", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46311\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The contacts component has a free (undefined) provider vulnerability. Successful exploitation of this vulnerability may affect data integrity.\n\ud83d\udccf Published: 2022-12-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-17T14:51:46.896Z\n\ud83d\udd17 References:\n1. https://device.harmonyos.com/en/docs/security/update/security-bulletins-202212-0000001462975397", "creation_timestamp": "2025-04-17T14:58:13.000000Z"}, {"uuid": "1993bb79-0927-4d91-a7fd-b7e081c21895", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46319", "type": "seen", "source": "https://t.me/cibsecurity/55024", "content": "\u203c CVE-2022-46319 \u203c\n\nFingerprint calibration has a vulnerability of lacking boundary judgment. Successful exploitation of this vulnerability may cause out-of-bounds write.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-21T00:12:42.000000Z"}, {"uuid": "42752c96-582e-4e52-b6a0-f311f343e214", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46310", "type": "seen", "source": "https://t.me/cibsecurity/55021", "content": "\u203c CVE-2022-46310 \u203c\n\nThe TelephonyProvider module has a vulnerability in obtaining values.Successful exploitation of this vulnerability may affect data confidentiality.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-21T00:12:38.000000Z"}, {"uuid": "fbeee764-4f08-4998-bb4e-fd4bbbd3e26c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46317", "type": "seen", "source": "https://t.me/cibsecurity/55020", "content": "\u203c CVE-2022-46317 \u203c\n\nThe power consumption module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-21T00:12:37.000000Z"}, {"uuid": "46cd70db-a7dd-424e-ba01-cf3dfa62a493", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46318", "type": "seen", "source": "https://t.me/cibsecurity/55019", "content": "\u203c CVE-2022-46318 \u203c\n\nThe HAware module has a function logic error. Successful exploitation of this vulnerability will affect the account removal function in Settings.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-21T00:12:36.000000Z"}, {"uuid": "ad54eebd-3140-4e35-8647-9b72c1749eed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46316", "type": "seen", "source": "https://t.me/cibsecurity/55012", "content": "\u203c CVE-2022-46316 \u203c\n\nA thread security vulnerability exists in the authentication process. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-21T00:12:28.000000Z"}, {"uuid": "6a0bcf5d-599f-4f78-b842-f181cbb5d92f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46314", "type": "seen", "source": "https://t.me/cibsecurity/55013", "content": "\u203c CVE-2022-46314 \u203c\n\nThe IPC module has defects introduced in the design process. Successful exploitation of this vulnerability may affect system availability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-21T00:12:30.000000Z"}, {"uuid": "7f307599-f34f-41a3-93dc-98fb00e2395d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4631", "type": "seen", "source": "https://t.me/cibsecurity/55080", "content": "\u203c CVE-2022-4631 \u203c\n\nA vulnerability, which was classified as problematic, was found in WP-Ban. Affected is an unknown function of the file ban-options.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 22b925449c84faa9b7496abe4f8f5661cb5eb3bf. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216480.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-21T22:13:11.000000Z"}, {"uuid": "3a3b2c17-80b2-48d1-9a53-3e05d87fdd7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46313", "type": "seen", "source": "https://t.me/cibsecurity/55031", "content": "\u203c CVE-2022-46313 \u203c\n\nThe sensor privacy module has an authentication vulnerability. Successful exploitation of this vulnerability may cause unavailability of the smartphone's camera and microphone.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-21T00:12:49.000000Z"}]}