Owl Labs Meeting Owl 5.2.0.15 allows attackers to retrieve the passcode hash via a certain c 10 value over Bluetooth.Read More ...
Continue ReadingJune 02, 2022
Owl Labs Meeting Owl 5.2.0.15 allows attackers to activate Tethering Mode with hard-coded hoothoot credentials via a certain c 150 value.Read More ...
Continue ReadingJune 02, 2022
Owl Labs Meeting Owl 5.2.0.15 allows attackers to deactivate the passcode protection mechanism via a certain c 11 message.Read More ...
Continue ReadingJune 02, 2022
Owl Labs Meeting Owl 5.2.0.15 allows attackers to control the device via a backdoor password (derived from the serial number) that can be found in Bluetooth broadcast data.Read More ...
Continue ReadingJune 02, 2022
Owl Labs Meeting Owl 5.2.0.15 does not require a password for Bluetooth commands, because only client-side authentication is used.Read More ...
Continue ReadingJune 02, 2022
Found **https://hpmusic[.]cloud/api/config/database.php** in [RS...Read More ...
Continue ReadingJune 02, 2022
Found **https://hpmusic[.]cloud/api/tests/exampletest.php** in [...Read More ...
Continue ReadingJune 02, 2022
This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will b ...
Continue ReadingJune 02, 2022
Back to Main