Total
114 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2025-20063 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion. | |||||
CVE-2025-21082 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion. | |||||
CVE-2025-23235 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through out-of-bounds read. | |||||
CVE-2025-24493 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 5.5 MEDIUM |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through race condition. | |||||
CVE-2025-25217 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. | |||||
CVE-2025-26691 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 5.5 MEDIUM |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. | |||||
CVE-2025-26693 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. | |||||
CVE-2025-27131 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 6.1 MEDIUM |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOSÂ through improper input. | |||||
CVE-2025-27242 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input. | |||||
CVE-2025-27247 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 5.5 MEDIUM |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. | |||||
CVE-2025-27563 | 1 Openatom | 1 Openharmony | 2025-06-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. | |||||
CVE-2025-27132 | 1 Openatom | 1 Openharmony | 2025-05-09 | N/A | 3.8 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios. | |||||
CVE-2025-27241 | 1 Openatom | 1 Openharmony | 2025-05-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. | |||||
CVE-2025-27248 | 1 Openatom | 1 Openharmony | 2025-05-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. | |||||
CVE-2025-22886 | 1 Openatom | 1 Openharmony | 2025-05-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory. | |||||
CVE-2025-25052 | 1 Openatom | 1 Openharmony | 2025-05-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through buffer overflow. | |||||
CVE-2025-25218 | 1 Openatom | 1 Openharmony | 2025-05-09 | N/A | 3.3 LOW |
in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. | |||||
CVE-2025-0587 | 1 Openatom | 1 Openharmony | 2025-03-11 | N/A | 3.8 LOW |
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios. | |||||
CVE-2025-20042 | 1 Openatom | 1 Openharmony | 2025-03-04 | N/A | 5.5 MEDIUM |
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through out-of-bounds read. | |||||
CVE-2025-20081 | 1 Openatom | 1 Openharmony | 2025-03-04 | N/A | 3.8 LOW |
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios. |