6.6
CVE-2024-53017 - Use of Out-of-range Pointer Offset in Camera Driver
Memory corruption while handling test pattern generator IOCTL command.
6.6
CVE-2024-53016 - Time-of-check Time-of-use (TOCTOU) Race Condition in Camera Driver
Memory corruption while processing I2C settings in Camera driver.
6.6
CVE-2024-53015 - Use After Free in Computer Vision
Memory corruption while processing IOCTL command to handle buffers associated with a session.
6.6
CVE-2024-53013 - Buffer Copy Without Checking Size of Input in Audio
Memory corruption may occur while processing voice call registration with user.
7.8
CVE-2024-53010 - Improper Access Control in Core
Memory corruption may occur while attaching VM when the HLOS retains access to VM.
5.1
CVE-2025-31712 -
In cplog service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed.
5.1
CVE-2025-31711 -
In cplog service, there is a possible system crash due to null pointer dereference. This could lead to local denial of service with no additional execution privileges needed.
5.9
CVE-2025-31710 -
In engineermode service, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed.
9.8
CVE-2025-4797 - Golo <= 1.7.0 - Authentication Bypass to Account Takeover
The Golo - City Travel Guide WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.7.0. This is due to the plugin not properly validating a user's identity prior to setting an authorization cookie. This makes it possibโฆ
7.2
CVE-2025-4224 - wpForo + wpForo Advanced Attachments <= 3.1.3 - Unauthenticated Stored Cross-Site Scripting
The wpForo + wpForo Advanced Attachments plugin for WordPress is vulnerable to Stored Cross-Site Scripting via media upload names in all versions up to, and including, 3.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Custom-lโฆ