SecuriTeam Secure Disclosure

SSD Advisory – Android Printing Man in the Middle Attack

Vulnerabilities Summary Android 8.1 has introduced the new feature of a default printing service. This service, based on the very…

2 years ago

SSD Advisory – IRDA Linux Driver UAF

Vulnerabilities Summary The following advisory describes two vulnerabilities in the Linux Kernel. By combining these two vulnerabilities a privilege escalation…

2 years ago

SSD Advisory – ASUSTOR NAS Devices Authentication Bypass

Vulnerabilities Summary An ASUSTOR NAS or network attached storage is “a computer appliance built from the ground up for storing…

2 years ago

SSD Advisory – CloudByte ElastiStor OS Unauthenticated Remote Code Execution

Vulnerabilities Summary The following advisory describes two vulnerabilities found in ElastiCenter, ElastiStor’s management console, File Injection that leads to unauthenticated…

2 years ago

SSD Advisory – Infiniband Linux Driver UAF

Vulnerability Summary A bug in the threads synchronization of Infiniband Driver can cause an Use After Free. A struct that…

2 years ago

SSD Advisory – LINE Corporation URI Handlers Remote Commands Execution

Vulnerabilities Summary LINE for Windows provided by LINE Corporation specifies the path to read DLL when launching software. A user…

2 years ago

SSD Advisory – phpMyAdmin File Inclusion and Remote Code Execution

Vulnerabilities Summary Authenticated users can exploit a file inclusion vulnerability in phpMyAdmin which can then be combined with another vulnerability,…

2 years ago

Hack2Win eXtreme Warm Up

In our upcoming Hack2Win eXtreme event in Hong Kong we will be asking contest participants to come and try their…

2 years ago

SSD Advisory – QRadar Remote Command Execution

Vulnerability Summary Multiple vulnerabilities in QRadar allow a remote unauthenticated attackers to cause the product to execute arbitrary commands. Each…

3 years ago

SSD Advisory – Linux AF_LLC Double Free

Vulnerability Summary A use after free vulnerability in AF_LLC allows local attackers to control the flow of code that the…

3 years ago