CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: All data of this company will be available for download on 12.06.2025.ControlPoint Surveying, Inc. - a recognized leader in topographic, hydrographic and cadastral surveying in Hawaii and the Pacific Rim. The name of the firm is associated wi ...
Source: Ransomware.live
May 29th, 2025 (18 days ago)
Description: All data of this company will be available for download on 13.06.2025.Logan University is a private university specializing in chiropractic and health sciences located in Chesterfield, Missouri. 1.Part-time employment agreement between Logan ...
Source: Ransomware.live
May 29th, 2025 (18 days ago)
Description: All data of this company will be available for download on 11.06.2025.Team Horner is a family of companies operating in various fields in the pool and spa industry worldwide. Founded in 1969, Team Horner is an integrated manufacturer, wholesa ...
Source: Ransomware.live
May 29th, 2025 (18 days ago)
Description: All data of this company will be available for download on 09.06.2025.A1 Trusses Ltd. has been building timber trusses for contractors and residents of the Lower Mainland area of Vancouver since 1983. We are one of the oldest truss companies ...
Source: Ransomware.live
May 29th, 2025 (18 days ago)
Description: All data of this company will be available for download on 10.06.2025.In 2004, Dallas-based entrepreneurs Adam Alfia and Kfir Alfia co-founded Maestro Personal Assistants, which focuses on providing personal assistance and concierge services ...
Source: Ransomware.live
May 29th, 2025 (18 days ago)
Description: All data of this company will be available for download on 12.06.2025.The mission of Botetourt County Public Schools is to provide all students with the quality learning experiences necessary to grow, adapt, and meet the challenges of respons ...
Source: Ransomware.live
May 29th, 2025 (18 days ago)
Description: Benvenuto in Little Italy at Frankfurt Airport How wonderful that Italian cuisine exists, with its colorful and aromatic dishes that always taste a little like vacation. With crisp salads, soups, succulent meat, and fresh fish, LITTLE ITALY ...
Source: Ransomware.live
May 29th, 2025 (18 days ago)

CVE-2025-37999

Description: In the Linux kernel, the following vulnerability has been resolved: fs/erofs/fileio: call erofs_onlinefolio_split() after bio_add_folio() If bio_add_folio() fails (because it is full), erofs_fileio_scan_folio() needs to submit the I/O request via erofs_fileio_rq_submit() and allocate a new I/O request with an empty `struct bio`. Then it retries the bio_add_folio() call. However, at this point, erofs_onlinefolio_split() has already been called which increments `folio->private`; the retry will call erofs_onlinefolio_split() again, but there will never be a matching erofs_onlinefolio_end() call. This leaves the folio locked forever and all waiters will be stuck in folio_wait_bit_common(). This bug has been added by commit ce63cb62d794 ("erofs: support unencoded inodes for fileio"), but was practically unreachable because there was room for 256 folios in the `struct bio` - until commit 9f74ae8c9ac9 ("erofs: shorten bvecs[] for file-backed mounts") which reduced the array capacity to 16 folios. It was now trivial to trigger the bug by manually invoking readahead from userspace, e.g.: posix_fadvise(fd, 0, st.st_size, POSIX_FADV_WILLNEED); This should be fixed by invoking erofs_onlinefolio_split() only after bio_add_folio() has succeeded. This is safe: asynchronous completions invoking erofs_onlinefolio_end() will not unlock the folio because erofs_fileio_scan_folio() is still holding a reference to be released by erofs_onlinefolio_end() at the end.

EPSS Score: 0.02%

Source: CVE
May 29th, 2025 (18 days ago)

CVE-2025-37998

Description: In the Linux kernel, the following vulnerability has been resolved: openvswitch: Fix unsafe attribute parsing in output_userspace() This patch replaces the manual Netlink attribute iteration in output_userspace() with nla_for_each_nested(), which ensures that only well-formed attributes are processed.

EPSS Score: 0.04%

Source: CVE
May 29th, 2025 (18 days ago)

CVE-2025-37997

Description: In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: fix region locking in hash types Region locking introduced in v5.6-rc4 contained three macros to handle the region locks: ahash_bucket_start(), ahash_bucket_end() which gave back the start and end hash bucket values belonging to a given region lock and ahash_region() which should give back the region lock belonging to a given hash bucket. The latter was incorrect which can lead to a race condition between the garbage collector and adding new elements when a hash type of set is defined with timeouts.

EPSS Score: 0.03%

Source: CVE
May 29th, 2025 (18 days ago)