CVE-2021-22424
- EPSS 0.02%
- Veröffentlicht 03.08.2021 18:15:08
- Zuletzt bearbeitet 21.11.2024 05:50:06
A component of the HarmonyOS has a Kernel Memory Leakage Vulnerability. Local attackers may exploit this vulnerability to cause Kernel Denial of Service.
CVE-2021-22425
- EPSS 0.02%
- Veröffentlicht 03.08.2021 18:15:08
- Zuletzt bearbeitet 21.11.2024 05:50:06
A component of the HarmonyOS has a Double Free vulnerability. Local attackers may exploit this vulnerability to cause Root Elevating Privileges.
CVE-2021-22416
- EPSS 0.02%
- Veröffentlicht 03.08.2021 18:15:07
- Zuletzt bearbeitet 21.11.2024 05:50:05
A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution.
CVE-2021-22318
- EPSS 0.02%
- Veröffentlicht 14.07.2021 11:15:07
- Zuletzt bearbeitet 21.11.2024 05:49:54
A component of the HarmonyOS 2.0 has a Null Pointer Dereference Vulnerability. Local attackers may exploit this vulnerability to cause system denial of service.
CVE-2021-22326
- EPSS 0.07%
- Veröffentlicht 30.06.2021 14:15:08
- Zuletzt bearbeitet 21.11.2024 05:49:54
A component of the HarmonyOS has a Privilege Dropping / Lowering Errors vulnerability. Local attackers may exploit this vulnerability to obtain Kernel space read/write capability.
CVE-2021-22376
- EPSS 0.02%
- Veröffentlicht 30.06.2021 14:15:08
- Zuletzt bearbeitet 21.11.2024 05:50:00
A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to bypass user restrictions.
CVE-2021-22294
- EPSS 0.02%
- Veröffentlicht 02.03.2021 19:15:13
- Zuletzt bearbeitet 21.11.2024 05:49:51
A component API of the HarmonyOS 2.0 has a permission bypass vulnerability. Local attackers may exploit this vulnerability to issue commands repeatedly, exhausting system service resources.
CVE-2021-22296
- EPSS 0.07%
- Veröffentlicht 02.03.2021 19:15:13
- Zuletzt bearbeitet 21.11.2024 05:49:51
A component of HarmonyOS 2.0 has a DoS vulnerability. Local attackers may exploit this vulnerability to mount a file system to the target device, causing DoS of the file system.