Currently trending CVE - Hype Score: 1 - Yii 2 before 2.0.52 mishandles the attaching of behavior that is defined by an __class array key, a CVE-2024-4990 regression, as exploited in the wild in February through April 2025.
Currently trending CVE - Hype Score: 1 - Description information displayed in the site administration live log
required additional sanitizing to prevent a stored XSS risk.
Currently trending CVE - Hype Score: 1 - Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, ...
MintsLoader is a malware loader delivering the GhostWeaver RAT via a multi-stage chain using obfuscated JavaScript and PowerShell. Recorded Future researchers observed MintsLoader delivering payloads like GhostWeaver via obfuscated scripts, evading detection with sandbox/VM checks, and uses DGA and HTTP C2. MintsLoader is a malware loader that was first spotted in 2024, the loader has […]
A vulnerability has been found in MediaTek MT6878, MT6897, MT6899, MT6989, MT6991, MT8775 and MT8796 and classified as critical. Affected by this vulnerability is an unknown functionality of the component scp. The manipulation leads to out-of-bounds write.
This vulnerability is known as CVE-2025-20668. An attack has to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in MediaTek MT2718, MT6878, MT6897, MT6899, MT6989, MT6991, MT8196, MT8391, MT8676 and MT8678 and classified as critical. Affected by this issue is some unknown functionality of the component thermal. The manipulation leads to out-of-bounds write.
This vulnerability is handled as CVE-2025-20671. Local access is required to approach this attack. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in PCMan FTP Server 2.0.7. It has been rated as critical. Affected by this issue is some unknown functionality of the component LIST Command Handler. The manipulation leads to buffer overflow.
This vulnerability is handled as CVE-2025-4254. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in PCMan FTP Server 2.0.7. This affects an unknown part of the component RMD Command Handler. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2025-4255. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Oracle Communications WebRTC Session Controller 7.2.0/7.2.1. Affected is an unknown function of the component Platform. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2022-25647. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Oracle Banking Platform 2.9.0. Affected by this issue is some unknown functionality of the component Security. The manipulation leads to denial of service.
This vulnerability is handled as CVE-2022-25647. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as critical was found in Oracle GraalVM Enterprise Edition 20.3.6/21.3.2/22.1.0. Affected by this vulnerability is an unknown functionality of the component Native Image. The manipulation leads to denial of service.
This vulnerability is known as CVE-2022-25647. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Oracle Retail Order Broker 18.0/19.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the component System Administration. The manipulation leads to denial of service.
This vulnerability is known as CVE-2022-25647. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Oracle Communications Cloud Native Core Binding Support Function 22.2.1 and classified as critical. This issue affects some unknown processing of the component Signaling. The manipulation leads to denial of service.
The identification of this vulnerability is CVE-2022-25647. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Oracle Communications Cloud Native Core Console 22.2.0. It has been classified as critical. Affected is an unknown function of the component Installer. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2022-25647. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Oracle Communications Cloud Native Core Policy 22.2.1. It has been classified as critical. This affects an unknown part of the component Signaling. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2022-25647. It is possible to initiate the attack remotely. There is no exploit available.