Latest Security Vulnerabilities – AUG 2019

Bluetooth – Encryption Key Negotiation of Bluetooth Vulnerability   Description: Bluetooth BR/EDR key negotiation vulnerability exists at the hardware specification level of any BR/EDR Bluetooth device. An attacker would need specialized hardware and would be limited...

Latest Security Vulnerabilities – JUL 2019

Microsoft Excel – Information Disclosure Vulnerability   Description: An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. To exploit the vulnerability, an attacker could craft a special document...

Latest Security Vulnerabilities – JUN 2019

Microsoft Speech API – Remote Code Execution Vulnerability   Description: A remote code execution vulnerability exists when the Microsoft Speech API (SAPI) improperly handles text-to-speech (TTS) input. Threat: To exploit the vulnerability, an attacker would need to...

Latest Security Vulnerabilities – MAY 2019

Internet Explorer – Information Disclosure Vulnerability   Description: An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. Threat: An attacker who successfully exploited the vulnerability could obtain...

Latest Security Vulnerabilities – APR 2019

Microsoft Edge – Chakra Scripting Engine Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. Threat: If the current user is logged on with...