TalkSport – The vulnerability disclosure utility for SpellVulnerable was updated to version 2.0.0 on August 30, 2018.
The tool is available for free on the Microsoft site and can be found under the ‘Programs and Features’ section of the Windows Store.
The update is available to everyone and requires a Windows 10 64-bit computer running Windows 10 Pro, 64-bits Windows 10 Professional, or Windows 10 Ultimate.
What’s new in version 2: The utility now shows the following options in the Settings menu: Option to add additional settings to the wizard: Create a new ‘SpellVulnerable’ application: Add a new vulnerability disclosure database: Update the ‘Vulnerability Disclosure Program’ database: Fix the spelling of the vulnerability disclosure text in the dialog: Make it easier to see the vulnerabilities database in the settings menu: Add more languages: The utility can now accept multiple languages.
New to version 1.0: When you click on the ‘Add a vulnerability disclosure’ button, the wizard creates a new application in the database for you.
When the wizard has completed creating the application, it asks you to ‘Accept’ the application.
If you don’t accept, the Wizard will prompt you to re-create the application to accept the new application.
If you choose to reject the application and start over, the newly created application will be used.
Once the application has been created, you can add additional application settings, such as adding a new language, using the ‘Update the database’ option, and more.
You can also view the database of all the vulnerabilities and apply new ones, or just add new vulnerabilities to existing vulnerabilities.
There are also additional wizard options for adding the ‘Reset’ button to the ‘Application settings’ menu, which can be used to remove or rename a vulnerability.
This update was released as part of the ‘Windows 10 Security Update’, a security patch roll-out to Windows 10 PCs.
A version of the utility will be available for Windows 10 Mobile devices, including the Nokia Lumia 950 and 950 XL.
Vulnerability Details: If a vulnerability is found, the vulnerability will be publicly disclosed through the Microsoft Exploit Database.
An application can be exposed through the application settings page and the ‘File’ menu.
Each application can also be exposed by visiting the Windows Registry and using a program that can detect vulnerabilities.