ewlett Packard Enterprise (HPE) this week announced patches for a critical-severity remote code execution vulnerability in its OneView IT infrastructure management software.
Tracked as CVE-2025-37164 (CVSS score of 10), the security defect can be exploited without authentication, the company notes ...
Search found 1854 matches
- Fri Jan 02, 2026 5:54 pm
- Forum: Commercial
- Topic: HPE Patches Critical Flaw in IT Infrastructure Management Software
- Replies: 0
- Views: 438
- Fri Jan 02, 2026 5:51 pm
- Forum: Linux
- Topic: PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel POSIX CPU Timers
- Replies: 0
- Views: 297
PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel POSIX CPU Timers
A critical race condition vulnerability in the Linux kernel’s POSIX CPU timers has been exposed through a detailed proof-of-concept, one of the most sophisticated kernel exploits targeting Android devices.
CVE-2025-38352 represents a use-after-free (UAF) vulnerability in the Linux kernel’s POSIX ...
CVE-2025-38352 represents a use-after-free (UAF) vulnerability in the Linux kernel’s POSIX ...
- Fri Jan 02, 2026 5:50 pm
- Forum: Embedded Systems
- Topic: Sleeping Bouncer Vulnerability Impacts Gigabyte, MSI, ASRock, and ASUS Motherboards
- Replies: 0
- Views: 264
Sleeping Bouncer Vulnerability Impacts Gigabyte, MSI, ASRock, and ASUS Motherboards
A critical firmware vulnerability affecting motherboards from major manufacturers including Gigabyte, MSI, ASRock, and ASUS has been discovered by Riot Games’ Vanguard anti-cheat team.
The vulnerability, dubbed “Sleeping Bouncer,” allows sophisticated hardware-based cheats to inject malicious code ...
The vulnerability, dubbed “Sleeping Bouncer,” allows sophisticated hardware-based cheats to inject malicious code ...
- Fri Jan 02, 2026 5:49 pm
- Forum: Windows
- Topic: Hunting Windows LPE Flaws Through Kernel Drivers and Named Pipes
- Replies: 0
- Views: 278
Hunting Windows LPE Flaws Through Kernel Drivers and Named Pipes
Security researchers from the Whitehat School recently completed an intensive bug-hunting project focused on identifying privilege escalation (LPE) flaws in Windows systems.
The findings reveal critical vulnerabilities in two major attack surfaces: kernel drivers and named pipes areas that ...
The findings reveal critical vulnerabilities in two major attack surfaces: kernel drivers and named pipes areas that ...
- Fri Jan 02, 2026 5:48 pm
- Forum: IOT Devices
- Topic: New Bluetooth Headphone Vulnerabilities Allow Hackers to Hijack Connected Smartphones
- Replies: 0
- Views: 415
New Bluetooth Headphone Vulnerabilities Allow Hackers to Hijack Connected Smartphones
Security researchers have disclosed critical vulnerabilities in Airoha-based Bluetooth headphones that enable attackers to compromise connected smartphones through chained exploits.
The three vulnerabilities CVE-2025-20700, CVE-2025-20701, and CVE-2025-20702 affect dozens of popular headphone ...
The three vulnerabilities CVE-2025-20700, CVE-2025-20701, and CVE-2025-20702 affect dozens of popular headphone ...
- Sat Dec 20, 2025 4:03 pm
- Forum: Android/iOS
- Topic: CISA Warns that Two Android Vulnerabilities Are Under Attack
- Replies: 0
- Views: 318
CISA Warns that Two Android Vulnerabilities Are Under Attack
CISA warned today that two Android zero-day vulnerabilities are under active attack, within hours of Google releasing patches for the flaws.
Both are high-severity Android framework vulnerabilities. CVE-2025-48572 is a Privilege Escalation vulnerability, while CVE-2025-48633 is an Information ...
Both are high-severity Android framework vulnerabilities. CVE-2025-48572 is a Privilege Escalation vulnerability, while CVE-2025-48633 is an Information ...
- Sat Dec 20, 2025 3:59 pm
- Forum: Android/iOS
- Topic: India Rolls Back Order to Preinstall Cybersecurity App on Smartphones
- Replies: 0
- Views: 387
India Rolls Back Order to Preinstall Cybersecurity App on Smartphones
5G attack
India’s telecoms ministry on Wednesday rolled back its order for smartphone manufacturers to preinstall a government-run cybersecurity app on new devices.
The Ministry of Communications on Monday asked smartphone makers to install the government’s “Sanchar Saathi” app within 90 days and ...
India’s telecoms ministry on Wednesday rolled back its order for smartphone manufacturers to preinstall a government-run cybersecurity app on new devices.
The Ministry of Communications on Monday asked smartphone makers to install the government’s “Sanchar Saathi” app within 90 days and ...
- Sat Dec 20, 2025 3:05 pm
- Forum: Android/iOS
- Topic: Address Bar Spoofing Vulnerability in ArcSearch for iOS by Arc
- Replies: 0
- Views: 365
Address Bar Spoofing Vulnerability in ArcSearch for iOS by Arc
The ArcSearch application for iOS, prior to version 1.45.2, is susceptible to an address bar spoofing vulnerability that occurs during iframe-triggered URI-scheme navigation. This flaw may allow an attacker to manipulate the content displayed in the address bar, leading users to believe they are ...
- Sat Dec 20, 2025 3:02 pm
- Forum: Web Applications
- Topic: Stored XSS Vulnerability in FiboSearch Plugin for WooCommerce by WordPress
- Replies: 0
- Views: 292
Stored XSS Vulnerability in FiboSearch Plugin for WooCommerce by WordPress
The FiboSearch – Ajax Search for WooCommerce plugin for WordPress is susceptible to a Stored Cross-Site Scripting (XSS) vulnerability through the thegem_te_search shortcode. This flaw arises from inadequate input sanitization and output escaping of user-supplied attributes, enabling authenticated ...
- Sat Dec 20, 2025 3:01 pm
- Forum: IOT Devices
- Topic: Security Advisory on Vulnerabilities in TP-Link WA850RE,
- Replies: 0
- Views: 315
Security Advisory on Vulnerabilities in TP-Link WA850RE,
Access of Uninitialized Pointer vulnerability in TP-Link WR940N and WR941ND allows local unauthenticated attackers the ability to execute DoS attack and potentially arbitrary code execution under the context of the ‘root’ user.This issue affects WR940N and WR941ND: ≤ WR940N v5 3.20.1 Build 200316 ...