Category: Vulnerability

Cable Haunt

Researchers find security flaws in cable modems

Cable Modems is a network device that can connect both a cable television network and a broadband network. Such equipment is usually installed when the operator provides users with both radio and television programs...

OpenCV vulnerabilities

OpenCV exists two serious security vulnerabilities

Researchers at Cisco Talos discovered two buffer overflow vulnerabilities in OpenCV version 4.1.0, namely CVE-2019-5063 (CVSS score 8.8) and CVE-2019-5064 (CVSS score 8.8). OpenCV (Open source computer vision) is a library of programming functions mainly aimed at...

Starbucks API key leaked in GitHub public repo

Recently, a bug bounty hunter discovered that an API key of Starbucks was exposed in a public GitHub repository, and reported the vulnerability through the HackerOne bug bounty platform. This flaw is Starbucks’ highest...

SQLite Remote Code Execution Vulnerability

Tencent Blade Team found serious SQLite vulnerability

Recently, the Tencent Blade Team discovered a set of SQLite vulnerabilities called “Magellan 2.0”, allowing hackers to remotely run various malicious programs on the Chrome browser. There are 5 vulnerabilities in this group, numbered...

Citrix vulnerability

Vulnerability in Citrix products puts 80,000 companies at risk

Hackers can use vulnerabilities (CVE-2019-19781) in Citrix’s Application Delivery Controller (NetScaler ADC) and Gateway (NetScaler Gateway) to sneak into the company’s intranet. The vulnerability was discovered by Mikhail Klyuchnikov of Positive Technologies. It is...