CVE-2022-36868 - Exposing MAC Addresses in MouseNKeyHidDevice – Details, Exploit, and Solutions
In late 2022, cybersecurity researchers uncovered a critical security flaw in the MouseNKeyHidDevice system on select Samsung devices. Catalogued as CVE-2022-36868, this vulnerability was due
CVE-2022-39855 FACM application has an access control vulnerability that allows a local attacker to connect arbitrary AP and Bluetooth devices.
This vulnerability is due to the weakness in the authentication process. An attacker can easily connect to a device and activate it remotely. Depending on
CVE-2022-33896 An overflow vulnerability exists in the way Hword of Hancom Office 2020 parses XML-based files.
To exploit this vulnerability, an attacker would need to persuade you to open a malicious file. For example, an attacker could trick you into visiting
CVE-2022-39872 In earlier versions of ShareLive, improper restriction of broadcasting led to the MAC address of connected Bluetooth devices being leaked.
We have received reports about users using wrong password for restricted broadcast, publishing incorrect URL, or using any other unexpected password. The problem with Bluetooth
CVE-2022-32819 Improved state management was addressed with iOS 15.6, iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, and macOS Monterey 12.5.
This can lead to data loss and other issues. To prevent this, keep an eye on app permissions.
There is a chance an app could
Episode
00:00:00
00:00:00