Bluetooth – Encryption Key Negotiation of Bluetooth Vulnerability Description: Bluetooth BR/EDR key negotiation vulnerability exists at the hardware specification level of any BR/EDR Bluetooth device. An attacker would need specialized hardware and would be limited...
Microsoft Excel – Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. To exploit the vulnerability, an attacker could craft a special document...
Last week, Australian Catholic University suffered from a data breach caused by a phishing email. The login credentials of some of their staff were exposed, giving hackers access to their email accounts, bank account details and other information. This is the second...
Microsoft Speech API – Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when the Microsoft Speech API (SAPI) improperly handles text-to-speech (TTS) input. Threat: To exploit the vulnerability, an attacker would need to...
Internet Explorer – Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. Threat: An attacker who successfully exploited the vulnerability could obtain...
Microsoft Edge – Chakra Scripting Engine Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. Threat: If the current user is logged on with...