SSD Secure Disclosure

SSD provides the quick and responsible way to get zero-day vulnerabilities reported to vendors.
Visit ssd-disclosure.com/ for more information.

2025-07-16

Want to learn about Chrome exploitation and the role of WebAssembly in it?

In our new article, we'll break down the world of WASM, how it interacts with V8, and use CVE-2024-2887 as a case study to show how flaws in WASM can lead to remote code execution.

Read it here: ssd-disclosure.com/an-introduc

2025-07-08

🚨 New advisory was just published! 🚨

A critical double-free vulnerability has been discovered in the pipapo set module of the Linux kernel’s NFT subsystem. An unprivileged attacker can exploit this vulnerability by sending a specially crafted netlink message, triggering a double-free error with high stability. This can then be leveraged to achieve local privilege escalation: ssd-disclosure.com/ssd-advisor

2025-07-01

💻 Have you read our recent publications?

ISPConfig Authenticated Remote Code Execution:
ssd-disclosure.com/ssd-advisor

Kerio Control Authentication Bypass and RCE:
ssd-disclosure.com/ssd-advisor

2025-06-24

🚨 New advisory was just published! 🚨

Kerio Control has a design flaw in the implementation of the communication with GFI AppManager, leading to an authentication bypass vulnerability in the product under audit. Once the authentication bypass is achieved, the attacker can cause the execution of arbitrary code and commands: ssd-disclosure.com/ssd-advisor

2025-06-10

🚨 New advisory was just published! 🚨

ISPConfig contains design flaws in the user creation and editing functionality, which allow a client user to escalate their privileges to superadmin. Additionally, the language modification feature enables arbitrary PHP code injection due to improper input validation: ssd-disclosure.com/ssd-advisor

2025-06-05

Submit your pfSense, Sophos & KerioControl vulnerabilities at: ssd-disclosure.com/submit/

2025-05-31

🌪️ TyphoonCon 2025 has officially wrapped up and it was an incredible experience, all thanks to YOU!

Shoutout to our attendees, crew, and sponsors for bringing the energy and making it an unforgettable event!

:sparkles_red: Stay tuned... TyphoonCon 2026 is already in the works, and we can't wait to see you there!

2025-05-30

🌪️ Last but not least! Closing Remarks and TyphoonPWN winners with SSD Secure Disclosure's Aviram Jenik and Noam Rathaus

2025-05-30

🌪️ Closing the day with @scannell_simon desyncing the planet

2025-05-30

🌪️ Up next, Assaf Morag is unveiling the invisible pathways to breaching AWS accounts

2025-05-30

🌪️ SOS! Thai Nguyen & Chuong Nguyen are showing us how to discover and exploit 0-days from 1-days at scale

2025-05-30

🌪️ Now on stage, NeoTheone is showing us how to steal a drone!

2025-05-30

🌪️ Up next, we’re attacking debug modules in the Android ecosystem with Lewei Qu

2025-05-30

🌪️ Now on stage at TyphoonCon 2025: just having fun with binary polynomials with @arnaugamez

2025-05-30

🌪️ Starting day 2 with our keynote Phuong Nguyen and his wonderful talk about building a low profile elite hacking team!

2025-05-30

🌪️ Conference day 2 starts now. Get ready for another day of great talks!

2025-05-29

It looks like Kerio Control was PWNed with a Pre auth RCE! We're going through the exploit now to see everything works like it should #TyphoonCon25

2025-05-29

🌪️ Ending day one of #TyphoonCon25 with SeongJoon Cho’s Pwning shopping mall CMS

2025-05-29

🌪️ Tapping into the past @typhooncon with @rdjgr & Carlo Meijer’s RCE via Fax Machine!

2025-05-29

🌪️ Up next, Satoki Tsuji is explaining the hidden risks of URL protocol handler leaks

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst