Low
CVSS: 3.8
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
Low
CVSS: 3.8
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios.
Medium
CVSS: 5.5
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through out-of-bounds read.
Low
CVSS: 3.8
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios.
Low
CVSS: 3.3
in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through out-of-bounds read.
Low
CVSS: 3.3
in OpenHarmony v5.0.2 and prior versions allow a local attacker case DOS through missing release of memory.
Low
CVSS: 3.8
in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios.
High
CVSS: 8.8
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free.
High
CVSS: 8.8
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow.
Medium
CVSS: 5.5
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through integer overflow.
Medium
CVSS: 4.4
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through use after free.
High
CVSS: 8.8
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the device is unable to boot up through out-of-bounds write.
Medium
CVSS: 5.5
in OpenHarmony v4.1.2 and prior versions allow a local attacker cause information leak through out-of-bounds Read.