Openharmony

Openharmony

62 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 07.04.2025 02:35:25
  • Zuletzt bearbeitet 16.10.2025 14:50:36

in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.

  • EPSS 0.12%
  • Veröffentlicht 07.01.2025 08:15:25
  • Zuletzt bearbeitet 16.10.2025 15:11:27

in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through use after free.

  • EPSS 0.13%
  • Veröffentlicht 07.01.2025 08:15:25
  • Zuletzt bearbeitet 16.10.2025 15:09:57

in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the device is unable to boot up through out-of-bounds write.

  • EPSS 0.11%
  • Veröffentlicht 07.01.2025 08:15:25
  • Zuletzt bearbeitet 16.10.2025 15:09:11

in OpenHarmony v4.1.2 and prior versions allow a local attacker cause information leak through out-of-bounds Read.

  • EPSS 0.06%
  • Veröffentlicht 09.01.2023 03:15:09
  • Zuletzt bearbeitet 21.11.2024 07:28:48

Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.

  • EPSS 0.06%
  • Veröffentlicht 09.01.2023 03:15:09
  • Zuletzt bearbeitet 21.11.2024 07:26:59

Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.

  • EPSS 0.03%
  • Veröffentlicht 08.12.2022 16:15:14
  • Zuletzt bearbeitet 21.11.2024 07:29:53

OpenHarmony-v3.1.4 and prior versions had an vulnerability. PIN code is transmitted to the peer device in plain text during cross-device authentication, which reduces the difficulty of man-in-the-middle attacks.

  • EPSS 0.04%
  • Veröffentlicht 08.12.2022 16:15:13
  • Zuletzt bearbeitet 21.11.2024 07:28:48

OpenHarmony-v3.1.2 and prior versions had a vulnerability that telephony in communication subsystem sends public events with personal data, but the permission is not set. Malicious apps could listen to public events and obtain information such as mob...

  • EPSS 0.06%
  • Veröffentlicht 08.12.2022 16:15:13
  • Zuletzt bearbeitet 21.11.2024 07:28:02

The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execu...

  • EPSS 0.06%
  • Veröffentlicht 08.12.2022 16:15:13
  • Zuletzt bearbeitet 21.11.2024 07:23:52

Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.