73 results (0.002 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

11 Aug 2025 — in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory. En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante la falta de liberación de memoria. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md • CWE-401: Missing Release of Memory after Effective Lifetime •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

11 Aug 2025 — in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free. En OpenHarmony v5.0.3 y versiones anteriores se permite a un atacante local la ejecución de código arbitrario en tcb mediante el use after free. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md • CWE-416: Use After Free •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

11 Aug 2025 — in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through improper input. En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante una entrada incorrecta. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md • CWE-20: Improper Input Validation •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

11 Aug 2025 — in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory. En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante la falta de liberación de memoria. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md • CWE-401: Missing Release of Memory after Effective Lifetime •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

11 Aug 2025 — in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through type confusion. En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local provoque un DOS a través de una confusión de tipos. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

11 Aug 2025 — in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante la desreferencia de un puntero NULL. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md • CWE-476: NULL Pointer Dereference •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

11 Aug 2025 — in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory. En OpenHarmony v5.0.3 y versiones anteriores se permite que un atacante local cometa un ataque DOS mediante la falta de liberación de memoria. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md • CWE-401: Missing Release of Memory after Effective Lifetime •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

11 Aug 2025 — in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free. En OpenHarmony v5.0.3 y versiones anteriores se permite a un atacante local la ejecución de código arbitrario en tcb mediante el use after free. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md • CWE-416: Use After Free •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

11 Aug 2025 — in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition. En OpenHarmony v5.0.3 y versiones anteriores se permite a un atacante local la ejecución de código arbitrario en tcb a través de una condición de ejecución. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-08.md • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

11 Aug 2025 — in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition. En OpenHarmony v5.0.3 y versiones anteriores se permite a un atacante local la ejecución de código arbitrario en tcb a través de una condición de ejecución. • https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-08.md • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •