Security Vulnerabilities
- CVEs Published In June 2025
Transient DOS while processing the tone measurement response buffer when the response buffer is out of range.
memory corruption while processing IOCTL commands, when the buffer in write loopback mode is accessed after being freed.
Information disclosure may occur while decoding the RTP packet with improper header length for number of contributing sources.
Memory corruption may occur while processing voice call registration with user.
Memory corruption while processing I2C settings in Camera driver.
Memory corruption while handling test pattern generator IOCTL command.
Memory corruption may occur while processing the OIS packet parser.
The Ninja Tables – Easy Data Table Builder plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 5.0.18 via deserialization of untrusted input from the args[callback] parameter . This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute arbitrary functions, though it does not allow user supplied parameters only single functions can be called so the impact is limited.
Out of bounds read and write in V8 in Google Chrome prior to 137.0.7151.68 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in Blink in Google Chrome prior to 137.0.7151.68 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)