CVE-2022-39855 FACM application has an access control vulnerability that allows a local attacker to connect arbitrary AP and Bluetooth devices.
This vulnerability is due to the weakness in the authentication process. An attacker can easily connect to a device and activate it remotely. Depending on
CVE-2022-39872 In earlier versions of ShareLive, improper restriction of broadcasting led to the MAC address of connected Bluetooth devices being leaked.
We have received reports about users using wrong password for restricted broadcast, publishing incorrect URL, or using any other unexpected password. The problem with Bluetooth
CVE-2022-33896 An overflow vulnerability exists in the way Hword of Hancom Office 2020 parses XML-based files.
To exploit this vulnerability, an attacker would need to persuade you to open a malicious file. For example, an attacker could trick you into visiting
CVE-2022-36868: Addressing the MouseNKeyHidDevice Vulnerability Prior to SMR Oct-2022 Release 1
The Common Vulnerabilities and Exposures (CVE) system has identified a security issue that requires attention. The CVE-2022-36868 vulnerability is associated with the MouseNKeyHidDevice application, which
CVE-2022-32819 Improved state management was addressed with iOS 15.6, iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, and macOS Monterey 12.5.
This can lead to data loss and other issues. To prevent this, keep an eye on app permissions.
There is a chance an app could
Episode
00:00:00
00:00:00