in OpenHarmony v4.0.0 and prior versions allow a remote attacker arbitrary code execution in pre-installed apps through use after free.
References
Link | Resource |
---|---|
https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md | Third Party Advisory |
Configurations
History
09 Sep 2024, 12:21
Type | Values Removed | Values Added |
---|---|---|
First Time |
Openatom
Openatom openharmony |
|
CPE | cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:* |
03 Jul 2024, 18:02
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:openharmony:openharmony:*:*:*:*:-:*:*:* | |
References | () https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-07.md - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Openharmony openharmony
Openharmony |
02 Jul 2024, 12:09
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 Jul 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-02 09:15
Updated : 2024-09-09 12:21
NVD link : CVE-2024-37030
Mitre link : CVE-2024-37030
CVE.ORG link : CVE-2024-37030
JSON object : View
Products Affected
openatom
- openharmony
CWE
CWE-416
Use After Free