Advisories archive


Warning: Invalid argument supplied for foreach() in /home/customer/www/ssd-disclosure.com/public_html/wp-content/plugins/post-grid/includes/post-grid-layout-elements.php on line 2921
Find out how a CSWH hijacking vulnerability in aaPanel allows remote attackers to cause an authenticated user to execute arbitrary
Find out how a cross site scripting vulnerability in SmarterMail allows remote attackers to obtain the JWT token used to
Find out how a directory traversal vulnerability in Ivanti Avalanche allows remote unauthenticated user to access files that reside outside
Find out how a vulnerability in VoIPmonitor allows an unauthenticated attacker to execute arbitrary code.
TL;DR Find out how vulnerabilities in TG8 Firewall allows remote unauthenticated users to execute arbitrary code on the remote device
TL;DR Find out how a vulnerability in NETGEAR R7000 allows an attacker to run arbitrary code without requiring authentication with
TL;DR Find out how multiple vulnerabilities in Hongdian H8922 allow an attacker to run arbitrary commands on the device with
TL;DR Find out how a vulnerability in OverlayFS allows local users under Ubuntu to gain root privileges. Vulnerability Summary An
TL;DR Find out how a memory corruption vulnerability can lead to a pre-auth remote code execution on QNAP QTS's Surveillance
TL;DR Find out how a vulnerability in DD-WRT allows an unauthenticated attacker to overflow an internal buffer used by UPNP