Filtered by vendor Openatom
Subscriptions
Total
87 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-0302 | 1 Openatom | 1 Openharmony | 2025-02-12 | 5.5 Medium |
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through integer overflow. | ||||
CVE-2025-0303 | 1 Openatom | 1 Openharmony | 2025-02-12 | 8.8 High |
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow. | ||||
CVE-2025-0304 | 1 Openatom | 1 Openharmony | 2025-02-12 | 8.8 High |
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free. | ||||
CVE-2024-28226 | 1 Openatom | 1 Openharmony | 2025-01-27 | 8.1 High |
in OpenHarmony v4.0.0 and prior versions allow a remote attacker cause DOS through improper input. | ||||
CVE-2024-24581 | 1 Openatom | 1 Openharmony | 2025-01-27 | 6.5 Medium |
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution through out-of-bounds write. | ||||
CVE-2024-22180 | 1 Openatom | 1 Openharmony | 2025-01-27 | 3.3 Low |
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through use after free. | ||||
CVE-2024-22092 | 1 Openatom | 1 Openharmony | 2025-01-27 | 7.7 High |
in OpenHarmony v3.2.4 and prior versions allow a remote attacker bypass permission verification to install apps, although these require user action. | ||||
CVE-2024-28951 | 1 Openatom | 1 Openharmony | 2025-01-24 | 5.5 Medium |
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. | ||||
CVE-2024-21834 | 1 Openatom | 1 Openharmony | 2025-01-02 | 3.3 Low |
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through type confusion. | ||||
CVE-2024-22098 | 1 Openatom | 1 Openharmony | 2025-01-02 | 6.5 Medium |
in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through use after free. | ||||
CVE-2024-22177 | 1 Openatom | 1 Openharmony | 2025-01-02 | 3.3 Low |
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause apps crash through get permission. | ||||
CVE-2024-29074 | 1 Openatom | 1 Openharmony | 2025-01-02 | 6.5 Medium |
in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through improper input. | ||||
CVE-2024-29086 | 1 Openatom | 1 Openharmony | 2025-01-02 | 3.3 Low |
in OpenHarmony v3.2.4 and prior versions allow a local attacker cause DOS through stack overflow. | ||||
CVE-2024-23808 | 1 Openatom | 1 Openharmony | 2025-01-02 | 5.2 Medium |
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free or cause DOS through NULL pointer dereference. | ||||
CVE-2024-27217 | 1 Openatom | 1 Openharmony | 2025-01-02 | 6.5 Medium |
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. | ||||
CVE-2024-3757 | 1 Openatom | 1 Openharmony | 2025-01-02 | 3.3 Low |
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through integer overflow. | ||||
CVE-2024-31078 | 1 Openatom | 1 Openharmony | 2025-01-02 | 3.3 Low |
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause service crash through NULL pointer dereference. | ||||
CVE-2024-3758 | 1 Openatom | 1 Openharmony | 2025-01-02 | 6.5 Medium |
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through heap buffer overflow. | ||||
CVE-2024-3759 | 1 Openatom | 1 Openharmony | 2025-01-02 | 6.5 Medium |
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through use after free. | ||||
CVE-2024-21816 | 1 Openatom | 1 Openharmony | 2024-12-16 | 4 Medium |
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through improper preservation of permissions. |