Latest Security Vulnerabilities – AUG 2019

Bluetooth – Encryption Key Negotiation of Bluetooth Vulnerability   Description: Bluetooth BR/EDR key negotiation vulnerability exists at the hardware specification level of any BR/EDR Bluetooth device. An attacker would need specialized hardware and would be limited...

Latest Security Vulnerabilities – JUN 2019

Microsoft Speech API – Remote Code Execution Vulnerability   Description: A remote code execution vulnerability exists when the Microsoft Speech API (SAPI) improperly handles text-to-speech (TTS) input. Threat: To exploit the vulnerability, an attacker would need to...
Subscribe To Our Newsletter

Subscribe To Our Newsletter

Register your email to receive the latest news and updates from getNEXT.

You have Successfully Subscribed!