Advisories
archive

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

SSD Advisory – Fortigate DHCP Stored XSS

Vulnerability SummaryThe following advisory describes a Stored XSS Vulnerability found in Fortinet’s Fortigate Firewall(FortiOS) via an unauthenticated DHCP packet.CVECVE-2019-6697CreditAn independent Security Researcher, Toshitsugu Yoneyama, has reported this vulnerability to SSD Secure Disclosure program.Affected systemsFortiOS v6.0.4

SSD Advisory – OpenSSH Pre-Auth XMSS Integer Overflow

Vulnerability SummaryThe following advisory describes a Pre-Auth Integer Overflow in the XMSS Key Parsing Algorithm in OpenSSH.CVECVE-2019-16905CreditAn independent Security Researcher, Adam “pi3” Zabrocki, has reported this vulnerability to SSD Secure Disclosure program.Affected SystemsOpenSSH version 7.7

TyphoonCon Challenge 2019

During TyphoonCon 2019 we held an open contest which involved a specially crafted binary program we provided. The goal of the contest was to code a program which, when launched, interacts with the challenge program

SSD Advisory – Adobe Acrobat Reader DC Use After Free

Vulnerability SummaryA use-after-free vulnerability exists in Adobe Acrobat Reader DC, which allows attackers execute arbitrary code with the privileges of the current user.CVECVE-2019-7805CreditAn independent Security Researcher has reported this vulnerability to SSD Secure Disclosure program.Affected

SSD Advisory – GetSimple CMS Unauthenticated Remote Code Execution

Vulnerabilities SummaryThe following advisory describes a vulnerability in GetSimple CMS which allows unauthenticated attackers to perform Remote Code Execution.CVECVE-2019-11231CreditAn independent Security Researcher, truerand0m, has reported this vulnerability to SSD Secure Disclosure program.Affected systemsGetSimple CMS version

SSD Advisory – VxWorks RPC Buffer Overflow

Vulnerability SummaryThe following advisory describes a vulnerability found in the Remote Procedure Call (RPC) component of the VxWorks real-time Opearting System, which suffers from a buffer overflow, this buffer overflow can be exploited to cause

?

Get in touch