Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-37785

Description: In the Linux kernel, the following vulnerability has been resolved: ext4: fix OOB read when checking dotdot dir Mounting a corrupted filesystem with directory which contains '.' dir entry with rec_len == block size results in out-of-bounds read (later on, when the corrupted directory is removed). ext4_empty_dir() assumes every ext4 directory contains at least '.' and '..' as directory entries in the first data block. It first loads the '.' dir entry, performs sanity checks by calling ext4_check_dir_entry() and then uses its rec_len member to compute the location of '..' dir entry (in ext4_next_entry). It assumes the '..' dir entry fits into the same data block. If the rec_len of '.' is precisely one block (4KB), it slips through the sanity checks (it is considered the last directory entry in the data block) and leaves "struct ext4_dir_entry_2 *de" point exactly past the memory slot allocated to the data block. The following call to ext4_check_dir_entry() on new value of de then dereferences this pointer which results in out-of-bounds mem access. Fix this by extending __ext4_check_dir_entry() to check for '.' dir entries that reach the end of data block. Make sure to ignore the phony dir entries for checksum (by checking name_len for non-zero). Note: This is reported by KASAN as use-after-free in case another structure was recently freed from the slot past the bound, but it is really an OOB read. This issue was found by syzkaller tool. Call Trace: [ 38.594108] BUG...

EPSS Score: 0.02%

Source: CVE
April 18th, 2025 (1 day ago)
Description: Cybersecurity researchers are warning of continued risks posed by a distributed denial-of-service (DDoS) malware known as XorDDoS, with 71.3 percent of the attacks between November 2023 and February 2025 targeting the United States. "From 2020 to 2023, the XorDDoS trojan has increased significantly in prevalence," Cisco Talos researcher Joey Chen said in a Thursday analysis. 
Source: TheHackerNews
April 18th, 2025 (1 day ago)

CVE-2025-2162

Description: The MapPress Maps for WordPress plugin before 2.94.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

EPSS Score: 0.02%

Source: CVE
April 18th, 2025 (1 day ago)
Source: Juniper Security Advisories
April 18th, 2025 (1 day ago)

CVE-2025-0467

Description: Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data outside the Guest's virtualised GPU memory.

EPSS Score: 0.02%

Source: CVE
April 18th, 2025 (1 day ago)
Description: Active! mail provided by QUALITIA CO., LTD. contains a stack-based buffer overflow vulnerability.
Source: Japan Vulnerability Notes (JVN)
April 18th, 2025 (1 day ago)
Description: Mid-America POOL RENOVATION, Inc (US)
Source: Ransomware.live
April 18th, 2025 (2 days ago)
Description: Compliance Consulting Group (US)
Source: Ransomware.live
April 18th, 2025 (2 days ago)
Description: Wilmington Personal Injury Lawyer - DPLAW(US)
Source: Ransomware.live
April 18th, 2025 (2 days ago)

CVE-2025-29461

Description: An issue in a-blogcms 3.1.15 allows a remote attacker to obtain sensitive information via the /bid/1/admin/entry-edit/ path.

EPSS Score: 0.05%

Source: CVE
April 17th, 2025 (2 days ago)