-
CVE-2025-31174
•
published on April 7, 2025
Path traversal vulnerability in the DFS module
Impact: Successful exploitation of this vulnerability may affect service confidentiality.
-
CVE-2025-31173
•
published on April 7, 2025
Memory write permission bypass vulnerability in the kernel futex module
Impact: Successful exploitation of this vulnerability may affect service confidentiality.
-
CVE-2025-31172
•
published on April 7, 2025
Memory write permission bypass vulnerability in the kernel futex module
Impact: Successful exploitation of this vulnerability may affect service confidentiality.
-
CVE-2025-31171
•
published on April 7, 2025
File read permission bypass vulnerability in the kernel file system module
Impact: Successful exploitation of this vulnerability may affect service confidentiality.
-
CVE-2025-31170
•
published on April 7, 2025
Access control vulnerability in the security verification module
Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality.
-
CVE-2024-58127
•
published on April 7, 2025
Access control vulnerability in the security verification module
Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality.
-
CVE-2024-58126
•
published on April 7, 2025
Access control vulnerability in the security verification module
Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality.
-
CVE-2024-58125
•
published on April 7, 2025
Access control vulnerability in the security verification module
Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality.
-
CVE-2024-58124
•
published on April 7, 2025
Access control vulnerability in the security verification module
Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality.
-
CVE-2024-58116
•
published on April 7, 2025
Buffer overflow vulnerability in the SVG parsing module of the ArkUI framework
Impact: Successful exploitation of this vulnerability may affect availability.
-
CVE-2024-58115
•
published on April 7, 2025
Buffer overflow vulnerability in the SVG parsing module of the ArkUI framework
Impact: Successful exploitation of this vulnerability may affect availability.
-
CVE-2024-58113
•
published on April 7, 2025
Vulnerability of improper resource management in the memory management module
Impact: Successful exploitation of this vulnerability may affect availability.
-
CVE-2024-58112
•
published on April 7, 2025
Exception capture failure vulnerability in the SVG parsing module of the ArkUI framework
Impact: Successful exploitation of this vulnerability may affect availability.
-
CVE-2024-58111
•
published on April 7, 2025
Exception capture failure vulnerability in the SVG parsing module of the ArkUI framework
Impact: Successful exploitation of this vulnerability may affect availability.
-
CVE-2024-58110
•
published on April 7, 2025
Buffer overflow vulnerability in the codec module
Impact: Successful exploitation of this vulnerability may affect availability.
-
CVE-2024-58109
•
published on April 7, 2025
Buffer overflow vulnerability in the codec module
Impact: Successful exploitation of this vulnerability may affect availability.
-
CVE-2024-58108
•
published on April 7, 2025
Buffer overflow vulnerability in the codec module
Impact: Successful exploitation of this vulnerability may affect availability.
-
CVE-2024-58107
•
published on April 7, 2025
Buffer overflow vulnerability in the codec module
Impact: Successful exploitation of this vulnerability may affect availability.
-
CVE-2024-58106
•
published on April 7, 2025
Buffer overflow vulnerability in the codec module
Impact: Successful exploitation of this vulnerability may affect availability.
-
CVE-2025-3334
•
published on April 7, 2025
A vulnerability was found in codeprojects Online Restaurant Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/category_save.php. The manipulation of the argument Category leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.