About

Hi, my name is Stefan Schiller (@scryh_). I have been a computer enthusiasts since my early childhood. Nowadays my main focus of interest is security research.

Discovered Vulnerabilities

Here is a list of vulnerabilities I discovered in public software:

SoftwareVulnerabilityImpactCVEReference
GuacamoleUse-After-FreeRCECVE-2023-30576Patch Notes
GuacamoleGuacamole Protocol InjectionInformation Disclosure, File ReadCVE-2023-30575Patch Notes
OpenMeetingsNull-Byte InjectionRCECVE-2023-29246Patch Notes
OpenMeetingsLogicalAuth BypassCVE-2023-29032Patch Notes
OpenMeetingsWeak Hash ComparisonAuth BypassCVE-2023-28936Patch Notes
OpenRefineZip SlipAssisted RCECVE-2023-37476GitHub
NETGEAR RAX30Stack-based Buffer OverflowRCECVE-2023-34285ZDI-23-839
PretalxPath TraversalLimited File WriteCVE-2023-28458Blog
PretalxPath TraversalArbitrary File ReadCVE-2023-28459Blog
NetdataCommand InjectionRCECVE-2023-22496GitHub
NetdataLogicalAuth BypassCVE-2023-22497GitHub
OpenNMSUnauthenticated, Stored XSSAssisted RCECVE-2023-0846GitHub
LibreNMSUnauthenticated, Stored XSSAssisted RCEBlog, huntr.dev
CactiLogical, Command InjectionRCECVE-2022-46169Blog, GitHub
NagVisType JugglingAuth BypassCVE-2022-3979Blog
NagVisArbitrary File ReadRCE chainCVE-2022-46945Blog
CheckmkCode InjectionRCE chainCVE-2022-46836Blog, Patch Notes
CheckmkLine Feed InjectionRCE chainCVE-2022-47909Blog, Patch Notes
CheckmkServer-Side Request ForgeryRCE chainCVE-2022-48321Blog, Patch Notes
Open Web AnalyticsInformation Disclosure / Arbitrary File WriteRCECVE-2022-24637Blog
mpv media playerFormat String / Heap OverflowAssisted RCECVE-2021-30145Blog
TeamSpeak 3Double-FreeDoSPatch Notes
AnyDeskFormat StringRCECVE-2020-13160Blog