CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: miyako Claims to be Selling Access to an Unidentified SCADA Engineering & Design Firm in the USA
Source: DarkWebInformer
February 28th, 2025 (4 months ago)
Description: Two denial of service vulnerabilities were found in ntpd-rs related to the handling of NTS cookies in our client functionality. Whenever an NTS source is configured and the server behind that source is sending zero-sized cookies or cookies larger than what would fit in our buffer size, ntpd-rs would crash. Only configured NTS sources can abuse these vulnerabilities. NTP sources or third parties that are not configured cannot make use of these vulnerabilities. For zero-sized cookies: a division by zero would force an exit when the number of new cookies that would need to be requested is calculated. In ntpd-rs 1.5.0 a check was added to prevent the division by zero. For large cookies: while trying to send a NTP request with the cookie included, the buffer is too small to handle the cookie and an exit of ntpd-rs is forced once a write to the buffer is attempted. The memory outside the buffer would not be written to in this case. In ntpd-rs 1.5.0 a check was added that prevents accepting cookies larger than 350 bytes. Users of older versions of ntpd-rs are recommended to update to the latest version. If an update is impossible, it is recommended to only add NTS sources to ntpd-rs that are trusted to not abuse this bug. References https://github.com/pendulum-project/ntpd-rs/security/advisories/GHSA-v83q-83hj-rw38 https://github.com/pendulum-project/ntpd-rs/commit/10a103b471dae25ac598140df0c195b6531bf716 https://github.com/pendulum-project/ntpd-rs/commit/37dd8d9a0faa03e7dfe3a4b...
Source: Github Advisory Database (Rust)
February 28th, 2025 (4 months ago)
Description: Law enforcement agencies from 19 countries have arrested 25 suspects linked to a criminal ring that was distributing child sexual abuse material (CSAM) generated using artificial intelligence (AI). [...]
Source: BleepingComputer
February 28th, 2025 (4 months ago)
Description: Security researchers have identified five vulnerabilities in the BioNTdrv.sys driver of Paragon Partition Manager, allowing attackers to escalate privileges or cause denial-of-service (DoS) attacks. Paragon Partition Manager, developed by Paragon Software, is a widely used disk partitioning tool available in Community and Commercial editions. It provides users with capabilities such as resizing, copying, and managing … The post Paragon Partition Manager Flaws Leveraged in Ransomware Attacks appeared first on CyberInsider.
Source: CyberInsider
February 28th, 2025 (4 months ago)

CVE-2025-24843

Description: Insecure file retrieval process that facilitates potential for file manipulation to affect product stability and confidentiality, integrity, authenticity, and attestation of stored data.

CVSS: MEDIUM (5.1)

EPSS Score: 0.02%

Source: CVE
February 28th, 2025 (4 months ago)

CVE-2025-23405

Description: Unauthenticated log effects metrics gathering incident response efforts and potentially exposes risk of injection attacks (ex log injection).

CVSS: MEDIUM (5.3)

EPSS Score: 0.04%

Source: CVE
February 28th, 2025 (4 months ago)

CVE-2025-20060

Description: An attacker could expose cross-user personal identifiable information (PII) and personal health information transmitted to the Android device via the Dario Health application database.

CVSS: HIGH (7.5)

EPSS Score: 0.09%

Source: CVE
February 28th, 2025 (4 months ago)

CVE-2025-0985

Description: IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD stores potentially sensitive information in environment variables that could be obtained by a local user.

CVSS: MEDIUM (5.5)

EPSS Score: 0.02%

SSVC Exploitation: none

Source: CVE
February 28th, 2025 (4 months ago)

CVE-2024-54175

Description: IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD could allow a local user to cause a denial of service due to an improper check for unusual or exceptional conditions.

CVSS: MEDIUM (5.5)

EPSS Score: 0.01%

SSVC Exploitation: none

Source: CVE
February 28th, 2025 (4 months ago)
Description: A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day exploit developed by Cellebrite to unlock the device, according to a new report from Amnesty International. "The Android phone of one student protester was exploited and unlocked by a sophisticated zero-day exploit chain targeting Android USB drivers, developed by Cellebrite," the international non-governmental
Source: TheHackerNews
February 28th, 2025 (4 months ago)