Posts for category: Vulnerabilities Weekly Summaries

Tesla Tricked into Traveling 50 MPH Over the Speed Limit

Introduction Tesla is seen as the leader in ecofriendly, smart vehicles with the goal of providing affordable transportation for everyone. The name Tesla is also associated with groundbreaking ...

Realtek HD Audio Driver DLL Hijacking

Introduction Realtek HD audio driver is a popular audio management driver for Windows systems. It provides high quality surround sound with other functions like a digital to analog converter (DAC). ...

CVE-2019-16920: Remote Code Execution Vulnerability on D-Link Brand Routers

IntroductionD-Link Systems, according to their website, is a “global leader in designing and developing networking and connectivity products for consumers, small businesses, medium to large-sized ...

Multiple Vulnerabilities and the Cobham EXPLORER 710 SATCOM Terminal

Introduction According to Cobham’s 2016 product data sheet, the EXPLORER 710 is a new-era Broadband Global Area Network (BGAN) satellite terminal capable of supporting high-data rate streaming ...

CVE-2019-17266: Heap-Based Buffer Overflow in libsoup HTTP Library

IntroductionAccording to GNOME’s internal wiki page, “libsoup is an HTTP client/server library for GNOME.” Libsoup uses “GObjects” and the “glib main loop” to work well with GNOME ...

CVE-2019-12643: Cisco REST Application Programming Interface (API) Vulnerability Allows Remote, Unauthorized, Privileged Actions

IntroductionAccording to Cisco’s official site, Cisco IOS XE is, “an open and flexible operating system optimized for a new era of enterprise networks.” The description continues as an open, ...

CVE-2019-5485: Node Package Manager Webhook (gitlabhook) Vulnerable to Arbitrary Command Injection

IntroductionAccording to its website, the Node Package Manager (NPM) is the world’s largest software registry, and one of the packages NPM manages is the Javascript language. GitLab, according to ...

CVE-2019-15846: Exim Mail Transfer Agent Vulnerable to Buffer Overflow Attack

IntroductionThe Exim mail transfer agent (MTA)/mail server is an open source service used on Unix-like operating systems. Exim can be used as substitutes for common mail servers such as Gmail and ...

CVE-2019-9506: Bluetooth Devices Vulnerable to Key Negotiation of Bluetooth (KNOB) Attacks

IntroductionOn August 14, 2019, a cybersecurity research team comprised of Daniele Antonioli, Nils Ole Tippenhauer, and Kasper B. Rasmussen, released a paper regarding a flaw in how Bluetooth enabled ...

Travel industry booking websites’ vulnerabilities compromise user’s data

On April 9, 2019 security researcher Candid Wuees disclosed on vulnerabilities that allowed malicious users to compromise customer booking data in the hotel industry. These vulnerabilities affect ...