Headline
CVE-2022-31463
Owl Labs Meeting Owl 5.2.0.15 does not require a password for Bluetooth commands, because only client-side authentication is used.
cj�Χ��2�4σ�-��(3sc㈤B���Iy`�iI7�AI�[�L�4LIϳ�HYАE�����\��˾-I������}Z#�����}�J�}R�e�5ح2Ƅ�`�K8��{3H�A�d�T�� y����U)&���w2�w�%UW��5)fb����2+:&Yɠ� 9S�e�`����0�rFi�0(��A�R#�KE&HJM�_���=�nG�HHM���8|�’!Aķ�v.’[ӡ�;�s��@�}�o�.S�#wV���m�mŽ��ͳ�������E�%�?.�’Bu��q �>����gōZa�и��O�Ă�r?� Op
Related news
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog due to active exploitation, while removing five bugs from the list due to lack of adequate evidence. The vulnerabilities newly added are below - CVE-2023-42793 (CVSS score: 9.8) - JetBrains TeamCity Authentication Bypass Vulnerability
Cybersecurity company Trend Micro has released patches and hotfixes to address a critical security flaw in Apex One and Worry-Free Business Security solutions for Windows that has been actively exploited in real-world attacks. Tracked as CVE-2023-41179 (CVSS score: 9.1), it relates to a third-party antivirus uninstaller module that's bundled along with the software. The complete list of impacted
After dragging their feet for months Owl Labs has released a patch for vulnerabilities that were publicly disclosed a week ago. The company denies the seriousness of the vulnerabilities. The post Update now! Patch against vulnerabilities in Meeting Owl Pro and Whiteboard Owl devices appeared first on Malwarebytes Labs.