CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input. |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. |
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause multimedia camera crash through modify a released pointer. |
OpenHarmony-v3.1.2 and prior versions, 3.0.6 and prior versions have an Out-of-bound memory read and write vulnerability in /dev/mmz_userdev device driver. The impact depends on the privileges of the attacker. The unprivileged process run on the device could read out-of-bound memory leading sensitive to information disclosure. The processes with system user UID run on the device would be able to write out-of-bound memory which could lead to unspecified memory corruption. |
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios. |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory. |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through buffer overflow. |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. |
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input. |
in OpenHarmony v3.2.2 and prior versions allow a local attacker cause DOS through occupy all resources
|
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. |
softbus_client_stub in communication subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.
|
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. |
platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.
|
in OpenHarmony v3.2.4 and prior versions allow a local attacker arbitrary code execution in any apps through improper input. |
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios. |
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios. |