Show filters
440 Total Results
Displaying 201-210 of 440
Sort by:
Attacker Value
Unknown

CVE-2022-43662

Disclosure Date: January 09, 2023 (last updated February 24, 2025)
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysTimerGettime. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.
Attacker Value
Unknown

CVE-2022-46081

Disclosure Date: January 04, 2023 (last updated February 24, 2025)
In Garmin Connect 4.61, terminating a LiveTrack session wouldn't prevent the LiveTrack API from continued exposure of private personal information. NOTE: this is disputed by the vendor because the LiveTrack API service is not a customer-controlled product.
Attacker Value
Unknown

CVE-2022-40899

Disclosure Date: December 23, 2022 (last updated October 08, 2023)
An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers to cause a denial of service via crafted Set-Cookie header from malicious web server.
Attacker Value
Unknown

CVE-2022-46393

Disclosure Date: December 15, 2022 (last updated February 24, 2025)
An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. There is a potential heap-based buffer overflow and heap-based buffer over-read in DTLS if MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.
Attacker Value
Unknown

CVE-2022-46392

Disclosure Date: December 15, 2022 (last updated February 24, 2025)
An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. An adversary with access to precise enough information about memory accesses (typically, an untrusted operating system attacking a secure enclave) can recover an RSA private key after observing the victim performing a single private-key operation, if the window size (MBEDTLS_MPI_WINDOW_SIZE) used for the exponentiation is 3 or smaller.
Attacker Value
Unknown

CVE-2022-42716

Disclosure Date: December 12, 2022 (last updated February 24, 2025)
An issue was discovered in the Arm Mali GPU Kernel Driver. There is a use-after-free. A non-privileged user can make improper GPU processing operations to gain access to already freed memory. This affects Valhall r29p0 through r40P0.
Attacker Value
Unknown

CVE-2022-45877

Disclosure Date: December 08, 2022 (last updated February 24, 2025)
OpenHarmony-v3.1.4 and prior versions had an vulnerability. PIN code is transmitted to the peer device in plain text during cross-device authentication, which reduces the difficulty of man-in-the-middle attacks.
Attacker Value
Unknown

CVE-2022-45118

Disclosure Date: December 08, 2022 (last updated February 24, 2025)
OpenHarmony-v3.1.2 and prior versions had a vulnerability that telephony in communication subsystem sends public events with personal data, but the permission is not set. Malicious apps could listen to public events and obtain information such as mobile numbers and SMS data without permissions.
Attacker Value
Unknown

CVE-2022-44455

Disclosure Date: December 08, 2022 (last updated February 24, 2025)
The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash.
Attacker Value
Unknown

CVE-2022-41802

Disclosure Date: December 08, 2022 (last updated February 24, 2025)
Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked.