Aggregator
Secure Your Spot at RSAC 2026 Conference
1 month 3 weeks hence
原域名已变更且将在2024年彻底废弃,请访问 https://govuln.com/news/ 查看新的RSS订阅
1 hour 9 minutes ago
原域名已变更且将在2024年彻底废弃,请访问 https://govuln.com/news/ 查看新的RSS订阅
Aligning Substance Use Privacy Regs With HIPAA Isn’t Simple
2 hours 11 minutes ago
Revisions to 42 CFR Part 2 that go into effect soon to better align federal regulations for the confidentiality of substance use disorder records with HIPAA require entities to adjust their compliance programs. But the changes aren't easy, said attorney David Holtzman, founder of HITprivacy LLC.
Idis Surveillance Management Software Vulnerable to Hacking
2 hours 11 minutes ago
Web-Based Client on Local Host Didn't Sanitize Inputs
Video camera surveillance management software made by South Korean manufacturer Idis is susceptible to a one-click attack giving hackers the power to execute arbitrary code. The vulnerability allows an attacker to escalate beyond the browser sandbox and achieve code execution on the host.
Video camera surveillance management software made by South Korean manufacturer Idis is susceptible to a one-click attack giving hackers the power to execute arbitrary code. The vulnerability allows an attacker to escalate beyond the browser sandbox and achieve code execution on the host.
'AI-Powered' Services Firm Says Hack Affects 3.1M
2 hours 11 minutes ago
Reported Victim Tally in HCIactive's Health Data Theft Incident Soars
The victim count in a 2025 hack against a Maryland-based firm that provides "AI-powered" administrative and technology services to healthcare practices soared to nearly 3.1 million nationwide, according to an updated breach report from Healthcare Interactive.
The victim count in a 2025 hack against a Maryland-based firm that provides "AI-powered" administrative and technology services to healthcare practices soared to nearly 3.1 million nationwide, according to an updated breach report from Healthcare Interactive.
Inside Arizona's Push to Modernize and Secure Campus IT
2 hours 11 minutes ago
CIO Elliott Cheu on Identity Upgrades, Unified Support and Research-Ready Systems
The University of Arizona is advancing a campus-wide modernization and security agenda by centralizing a previously fragmented IT environment and unifying core platforms that support teaching, research and operations, said Elliott Cheu, CIO at the university.
The University of Arizona is advancing a campus-wide modernization and security agenda by centralizing a previously fragmented IT environment and unifying core platforms that support teaching, research and operations, said Elliott Cheu, CIO at the university.
AI Use by CISA Chief Alarms Cyber Officials
2 hours 11 minutes ago
CISA Defends Director’s Use of AI Tool Despite Internal Compliance Review
Cybersecurity and Infrastructure Security Agency Acting Director Madhu Gottumukkala uploaded sensitive documents to ChatGPT under a temporary, approved exception, prompting internal alerts and reigniting concerns over the agency's AI governance and leadership judgement.
Cybersecurity and Infrastructure Security Agency Acting Director Madhu Gottumukkala uploaded sensitive documents to ChatGPT under a temporary, approved exception, prompting internal alerts and reigniting concerns over the agency's AI governance and leadership judgement.
马斯克:特斯拉 Model S 和 X 即将停产;小米 SU7 Ultra 官宣将正式上线《GT 赛车 7》;阿里云上线 Clawdbot 全套云服务|极客早知道
3 hours 1 minute ago
亚马逊宣布裁员 1.6 万人,关闭旗下 72 家自营超市、便利店;
苹果据悉今年 9 月只上 iPhone18 Pro 系列和首款阔折叠 Fold;
特斯拉宣布向马斯克旗下 xAI 投资 20 亿美元
A fake romance turns into an Android spyware infection
3 hours 53 minutes ago
ESET researchers have identified an Android spyware campaign that uses romance scam tactics to target individuals in Pakistan. The operation relies on a malicious app disguised as a chat service that routes conversations through WhatsApp. Behind the romance lure, the app’s primary function is to steal data from infected devices. ESET tracks the malware as GhostChat. GhostChat attack flow (Source: ESET) The same threat actor appears to be running a wider surveillance effort. This includes … More →
The post A fake romance turns into an Android spyware infection appeared first on Help Net Security.
Anamarija Pogorelec
威努特全光网络:医院数字化转型的“光”引擎
4 hours 12 minutes ago
助力智慧医疗建设。
CVE-2023-39329 | OpenJPEG tcd.c opj_t1_decode_cblks resource consumption (EUVD-2023-43060 / WID-SEC-2024-1530)
4 hours 18 minutes ago
A vulnerability classified as problematic was found in OpenJPEG. The impacted element is the function opj_t1_decode_cblks of the file tcd.c. The manipulation results in resource consumption.
This vulnerability is cataloged as CVE-2023-39329. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2023-39328 | OpenJPEG File resource consumption (EUVD-2023-43059 / Nessus ID 210667)
4 hours 18 minutes ago
A vulnerability classified as problematic was found in OpenJPEG. Impacted is an unknown function of the component File Handler. Such manipulation leads to resource consumption.
This vulnerability is traded as CVE-2023-39328. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2025-21589 | Juniper Session Smart Router up to 5.6.16/6.0.7/6.3.3-r1 authentication bypass (WID-SEC-2025-0393)
4 hours 18 minutes ago
A vulnerability classified as critical has been found in Juniper Session Smart Router, Session Smart Conductor and WAN Assurance Managed Router up to 5.6.16/6.0.7/6.3.3-r1. Impacted is an unknown function. The manipulation leads to authentication bypass using alternate channel.
This vulnerability is traded as CVE-2025-21589. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2023-39327 | OpenJPEG infinite loop (EUVD-2023-43058 / Nessus ID 207801)
4 hours 18 minutes ago
A vulnerability, which was classified as problematic, has been found in OpenJPEG. This affects an unknown function. This manipulation causes infinite loop.
This vulnerability is registered as CVE-2023-39327. Remote exploitation of the attack is possible. No exploit is available.
vuldb.com
CVE-2025-58151 | Xen varstored toctou (WID-SEC-2026-0225)
4 hours 18 minutes ago
A vulnerability marked as critical has been reported in Xen. The affected element is an unknown function of the component varstored. This manipulation causes time-of-check time-of-use.
This vulnerability is tracked as CVE-2025-58151. The attack is possible to be carried out remotely. No exploit exists.
Applying a patch is the recommended action to fix this issue.
vuldb.com
CVE-2025-31135 | phires go-guerrilla up to 1.6.6 Proxy Protocol input validation
4 hours 33 minutes ago
A vulnerability was found in phires go-guerrilla up to 1.6.6. It has been classified as problematic. This affects an unknown function of the component Proxy Protocol Handler. Performing a manipulation results in improper input validation.
This vulnerability is reported as CVE-2025-31135. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
vuldb.com
CVE-2025-58206 | ThemeMove MaxCoach Plugin up to 3.2.5 on WordPress filename control
4 hours 33 minutes ago
A vulnerability classified as problematic was found in ThemeMove MaxCoach Plugin up to 3.2.5 on WordPress. Impacted is an unknown function. Such manipulation leads to improper control of filename for include/require statement in php program ('php remote file inclusion').
This vulnerability is referenced as CVE-2025-58206. It is possible to launch the attack remotely. No exploit is available.
vuldb.com
CVE-2025-56157 | Dify up to 1.5.1 docker-compose.yaml default credentials
4 hours 33 minutes ago
A vulnerability described as problematic has been identified in Dify up to 1.5.1. This issue affects some unknown processing of the file docker-compose.yaml. The manipulation results in use of default credentials.
This vulnerability is known as CVE-2025-56157. Access to the local network is required for this attack. No exploit is available.
vuldb.com
CVE-2025-12793 | ASUS ASCI prior 1.1.37.0/3.1.49.0/3.2.50.0 untrusted search path
4 hours 33 minutes ago
A vulnerability described as problematic has been identified in ASUS ASCI. Affected by this vulnerability is an unknown functionality. Such manipulation leads to untrusted search path.
This vulnerability is referenced as CVE-2025-12793. The attack can only be performed from a local environment. No exploit is available.
Upgrading the affected component is recommended.
vuldb.com