Aggregator
Secure Your Spot at RSAC 2026 Conference
1 month 3 weeks hence
A fake romance turns into an Android spyware infection
1 hour 18 minutes ago
ESET researchers have identified an Android spyware campaign that uses romance scam tactics to target individuals in Pakistan. The operation relies on a malicious app disguised as a chat service that routes conversations through WhatsApp. Behind the romance lure, the app’s primary function is to steal data from infected devices. ESET tracks the malware as GhostChat. GhostChat attack flow (Source: ESET) The same threat actor appears to be running a wider surveillance effort. This includes … More →
The post A fake romance turns into an Android spyware infection appeared first on Help Net Security.
Anamarija Pogorelec
CVE-2023-39329 | OpenJPEG tcd.c opj_t1_decode_cblks resource consumption (EUVD-2023-43060 / WID-SEC-2024-1530)
1 hour 42 minutes ago
A vulnerability classified as problematic was found in OpenJPEG. The impacted element is the function opj_t1_decode_cblks of the file tcd.c. The manipulation results in resource consumption.
This vulnerability is cataloged as CVE-2023-39329. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2023-39328 | OpenJPEG File resource consumption (EUVD-2023-43059 / Nessus ID 210667)
1 hour 42 minutes ago
A vulnerability classified as problematic was found in OpenJPEG. Impacted is an unknown function of the component File Handler. Such manipulation leads to resource consumption.
This vulnerability is traded as CVE-2023-39328. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2025-21589 | Juniper Session Smart Router up to 5.6.16/6.0.7/6.3.3-r1 authentication bypass (WID-SEC-2025-0393)
1 hour 42 minutes ago
A vulnerability classified as critical has been found in Juniper Session Smart Router, Session Smart Conductor and WAN Assurance Managed Router up to 5.6.16/6.0.7/6.3.3-r1. Impacted is an unknown function. The manipulation leads to authentication bypass using alternate channel.
This vulnerability is traded as CVE-2025-21589. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-39327 | OpenJPEG infinite loop (EUVD-2023-43058 / Nessus ID 207801)
1 hour 42 minutes ago
A vulnerability, which was classified as problematic, has been found in OpenJPEG. This affects an unknown function. This manipulation causes infinite loop.
This vulnerability is registered as CVE-2023-39327. Remote exploitation of the attack is possible. No exploit is available.
vuldb.com
CVE-2025-58151 | Xen varstored toctou (WID-SEC-2026-0225)
1 hour 42 minutes ago
A vulnerability marked as critical has been reported in Xen. The affected element is an unknown function of the component varstored. This manipulation causes time-of-check time-of-use.
This vulnerability is tracked as CVE-2025-58151. The attack is possible to be carried out remotely. No exploit exists.
Applying a patch is the recommended action to fix this issue.
vuldb.com
CVE-2025-31135 | phires go-guerrilla up to 1.6.6 Proxy Protocol input validation
1 hour 57 minutes ago
A vulnerability was found in phires go-guerrilla up to 1.6.6. It has been classified as problematic. This affects an unknown function of the component Proxy Protocol Handler. Performing a manipulation results in improper input validation.
This vulnerability is reported as CVE-2025-31135. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
vuldb.com
CVE-2025-58206 | ThemeMove MaxCoach Plugin up to 3.2.5 on WordPress filename control
1 hour 57 minutes ago
A vulnerability classified as problematic was found in ThemeMove MaxCoach Plugin up to 3.2.5 on WordPress. Impacted is an unknown function. Such manipulation leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is referenced as CVE-2025-58206. It is possible to launch the attack remotely. No exploit is available.
vuldb.com
CVE-2025-56157 | Dify up to 1.5.1 docker-compose.yaml default credentials
1 hour 57 minutes ago
A vulnerability described as problematic has been identified in Dify up to 1.5.1. This issue affects some unknown processing of the file docker-compose.yaml. The manipulation results in use of default credentials.
This vulnerability is known as CVE-2025-56157. Access to the local network is required for this attack. No exploit is available.
vuldb.com
CVE-2025-12793 | ASUS ASCI prior 1.1.37.0/3.1.49.0/3.2.50.0 untrusted search path
1 hour 57 minutes ago
A vulnerability described as problematic has been identified in ASUS ASCI. Affected by this vulnerability is an unknown functionality. Such manipulation leads to untrusted search path.
This vulnerability is referenced as CVE-2025-12793. The attack can only be performed from a local environment. No exploit is available.
Upgrading the affected component is recommended.
vuldb.com
CVE-2025-47332 | Qualcomm Snapdragon Auto FastConnect 6200 up to WSA8845 Config Call toctou
1 hour 57 minutes ago
A vulnerability marked as critical has been reported in Qualcomm Snapdragon Auto, Snapdragon CCW, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT and Snapdragon Mobile. Affected by this issue is some unknown functionality of the component Config Call Handler. The manipulation leads to time-of-check time-of-use.
This vulnerability is documented as CVE-2025-47332. The attack needs to be performed locally. There is not any exploit available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2022-50900 | Wondershare Dr.Fone 12.0.18 unquoted search path (Exploit 50813 / EDB-50813)
1 hour 57 minutes ago
A vulnerability was found in Wondershare Dr.Fone 12.0.18. It has been declared as problematic. The affected element is an unknown function. The manipulation results in unquoted search path.
This vulnerability is reported as CVE-2022-50900. The attack requires a local approach. Moreover, an exploit is present.
vuldb.com
CVE-2022-50891 | Skyjos Owlfiles File Manager 12.0.1 HTTP Server Endpoint cross site scripting (Exploit 51036 / EDB-51036)
1 hour 57 minutes ago
A vulnerability was found in Skyjos Owlfiles File Manager 12.0.1 and classified as problematic. The impacted element is an unknown function of the component HTTP Server Endpoint. The manipulation results in cross site scripting.
This vulnerability is cataloged as CVE-2022-50891. The attack must be initiated from a local position. Furthermore, there is an exploit available.
vuldb.com
CVE-2022-50897 | mPDF 7.0 Annotation filename control (Exploit 50995 / EDB-50995)
1 hour 57 minutes ago
A vulnerability was found in mPDF 7.0. It has been rated as problematic. Affected is an unknown function of the component Annotation Handler. Performing a manipulation results in improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is reported as CVE-2022-50897. The attack is possible to be carried out remotely. Moreover, an exploit is present.
vuldb.com
CVE-2022-50901 | Wondershare Dr.Fone 11.4.9 unquoted search path (Exploit 50755 / EDB-50755)
1 hour 57 minutes ago
A vulnerability described as problematic has been identified in Wondershare Dr.Fone 11.4.9. This issue affects some unknown processing. Such manipulation leads to unquoted search path.
This vulnerability is uniquely identified as CVE-2022-50901. Local access is required to approach this attack. Moreover, an exploit is present.
vuldb.com
CVE-2025-63388 | Dify 1.9.1 Endpoint system-features access control (EUVD-2025-204306)
1 hour 57 minutes ago
A vulnerability was found in Dify 1.9.1. It has been rated as critical. Affected by this issue is some unknown functionality of the file /console/api/system-features of the component Endpoint. This manipulation causes improper access controls.
This vulnerability appears as CVE-2025-63388. The attack may be initiated remotely. There is no available exploit.
vuldb.com
CVE-2023-21477 | Samsung Devices TIGERF Trustlet access of memory location after end of buffer (EUVD-2023-25645)
1 hour 57 minutes ago
A vulnerability classified as critical was found in Samsung Devices. This affects an unknown part of the component TIGERF Trustlet. Such manipulation leads to access of memory location after end of buffer.
This vulnerability is referenced as CVE-2023-21477. The attack can only be performed from a local environment. No exploit is available.
Applying a patch is advised to resolve this issue.
vuldb.com
CVE-2025-58210 | ThemeMove Makeaholic Plugin up to 1.8.5 on WordPress authorization (EUVD-2025-26490)
1 hour 57 minutes ago
A vulnerability, which was classified as problematic, was found in ThemeMove Makeaholic Plugin up to 1.8.5 on WordPress. The impacted element is an unknown function. The manipulation results in missing authorization.
This vulnerability is identified as CVE-2025-58210. The attack can be executed remotely. There is not any exploit available.
vuldb.com