Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-50064

Description: In the Linux kernel, the following vulnerability has been resolved: zram: free secondary algorithms names We need to kfree() secondary algorithms names when reset zram device that had multi-streams, otherwise we leak memory. [[email protected]: kfree(NULL) is legal]

EPSS Score: 0.03%

SSVC Exploitation: none

Source: CVE
April 16th, 2025 (4 days ago)

CVE-2024-44943

Description: In the Linux kernel, the following vulnerability has been resolved: mm: gup: stop abusing try_grab_folio A kernel warning was reported when pinning folio in CMA memory when launching SEV virtual machine. The splat looks like: [ 464.325306] WARNING: CPU: 13 PID: 6734 at mm/gup.c:1313 __get_user_pages+0x423/0x520 [ 464.325464] CPU: 13 PID: 6734 Comm: qemu-kvm Kdump: loaded Not tainted 6.6.33+ #6 [ 464.325477] RIP: 0010:__get_user_pages+0x423/0x520 [ 464.325515] Call Trace: [ 464.325520] [ 464.325523] ? __get_user_pages+0x423/0x520 [ 464.325528] ? __warn+0x81/0x130 [ 464.325536] ? __get_user_pages+0x423/0x520 [ 464.325541] ? report_bug+0x171/0x1a0 [ 464.325549] ? handle_bug+0x3c/0x70 [ 464.325554] ? exc_invalid_op+0x17/0x70 [ 464.325558] ? asm_exc_invalid_op+0x1a/0x20 [ 464.325567] ? __get_user_pages+0x423/0x520 [ 464.325575] __gup_longterm_locked+0x212/0x7a0 [ 464.325583] internal_get_user_pages_fast+0xfb/0x190 [ 464.325590] pin_user_pages_fast+0x47/0x60 [ 464.325598] sev_pin_memory+0xca/0x170 [kvm_amd] [ 464.325616] sev_mem_enc_register_region+0x81/0x130 [kvm_amd] Per the analysis done by yangge, when starting the SEV virtual machine, it will call pin_user_pages_fast(..., FOLL_LONGTERM, ...) to pin the memory. But the page is in CMA area, so fast GUP will fail then fallback to the slow path due to the longterm pinnalbe check in try_grab_folio(). The slow path will try to pin the pages then migrate them out of CMA area. But the slow pa...

EPSS Score: 0.04%

SSVC Exploitation: none

Source: CVE
April 16th, 2025 (4 days ago)
Description: Google blocked 5.1 billion ads and suspended more than 39.2 million advertiser accounts in 2024, according to its 2024 Ads Safety Report released this week. [...]
Source: BleepingComputer
April 16th, 2025 (4 days ago)
Source: TheRegister
April 16th, 2025 (4 days ago)
Description: Cash in on big wins this tax season! Every hour from 5 - 9 pm, one lucky winner will snag $1,040 in CASH or Free Play! Earn just 25 points, print your voucher at a kiosk, and drop it in the drawing barrel for your shot at a hefty payout!
Source: Ransomware.live
April 16th, 2025 (4 days ago)
Description: UK - d-line
Source: Ransomware.live
April 16th, 2025 (4 days ago)
Description: United States
Source: Ransomware.live
April 16th, 2025 (4 days ago)
Description: ​​​​​​​​Bio-Clima Service Srl, an Italian company based in Bernareggio, Lombardy, specializing in the technical assistance, maintenance, and...
Source: Ransomware.live
April 16th, 2025 (4 days ago)

CVE-2025-22872

Description: The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).

EPSS Score: 0.01%

Source: CVE
April 16th, 2025 (4 days ago)

CVE-2024-53305

Description: An issue in the component /models/config.py of Whoogle search v0.9.0 allows attackers to execute arbitrary code via supplying a crafted search query.

EPSS Score: 0.07%

Source: CVE
April 16th, 2025 (4 days ago)