in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-16081 | in OpenHarmony v4.0.0 and prior versions allow a local attacker cause DOS through improper input. |
Wed, 07 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Sep 2024 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openatom
Openatom openharmony |
|
| CPEs | cpe:2.3:a:openharmony:openharmony:4.0:*:*:*:-:*:*:* |
cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:* cpe:2.3:o:openatom:openharmony:4.0:*:*:*:-:*:*:* |
| Vendors & Products |
Openharmony
Openharmony openharmony |
Openatom
Openatom openharmony |
Status: PUBLISHED
Assigner: OpenHarmony
Published:
Updated: 2025-05-07T20:08:47.274Z
Reserved: 2024-01-06T11:03:57.060Z
Link: CVE-2024-0285
Updated: 2024-08-01T17:41:16.599Z
Status : Modified
Published: 2024-02-02T07:15:09.980
Modified: 2024-11-21T08:46:13.907
Link: CVE-2024-0285
No data.
OpenCVE Enrichment
No data.
EUVD