MacOS X Gatekeeper bypass

24 May 2019

On MacOS X version <= 10.14.5 (at time of writing) it is possible to easily bypass Gatekeeper in order to execute untrusted code without any warning or user's explicit permission.


Tor Browser Deanonymization With SMB

12 September 2018

Tor Browser version < 8.0 and Firefox version < 62 / < 60.2.0esr are affected by an information disclosure vulnerability that allows remote attackers to bypass the intended anonymity feature and discover a client IP address. The vulnerability affects Windows users only and needs user interaction to be exploited.


TorMoil – Deanonymize Tor Browser Users with Automount

10 September 2018

Tor Browser version 7.0.8, and probably prior, for Mac OS X and Linux, is affected by an information disclosure vulnerability that  leads to full de-anonymization of website visitors using just a single html tag.


Mac OS X Local Javascript Quarantine Bypass

27 September 2017

Mac OS X contains a vulnerability that allows the bypass of the Apple Quarantine and the execution of arbitrary Javascript code without restrictions. Basically, Apple's Quarantine works by setting an extended attribute to downloaded files (and also to files extracted from downloaded archive/image) that tells the system to open/execute those files in a restricted environment. For example, a quarantined html file won't be able to load local resources. The vulnerability is in one html file, part of the Mac OS X core, that is prone to a DOM Based XSS allowing the execution of arbitrary javascript commands in its (unrestricted) context.


Squirrelmail Remote Code Execution

19 April 2017

Squirrelmail version 1.4.22 (and probably prior) is vulnerable to a remote code execution vulnerability because it fails to sanitize a string before passing it to a popen call. It's possible to exploit this vulnerability to execute arbitrary shell commands on the remote server. The problem is in Deliver_SendMail.class.php on initStream function that uses escapeshellcmd() to sanitize the sendmail command before executing it. The use of escapeshellcmd() is not correct in this case since it don't escapes whitespaces allowing the injection of arbitrary command parameters.


Microsoft Remote Desktop Client for Mac Remote Code Execution

7 December 2016

A vulnerability exists in Microsoft Remote Desktop for Mac that allows a remote attacker to execute arbitrary code on the target machine. User interaction is needed to exploit this issue, but a single click on a link (sent via mail, iMessage, etc.) is sufficient to trigger the vulnerability. Microsoft Remote Desktop Client for Mac OS X (ver 8.0.32 and probably prior) allows a malicious Terminal Server to read and write any file in the home directory of the connecting user. The vulnerability exists to the way the application handles rdp urls. In the rdp url schema it's possible to specify a parameter that will make the user's home directory accessible to the server without any warning or confirmation request. If an attacker can trick a user to open a malicious rdp url, he/she can read and write any file within the victim's home directory.


Symphony CMS Multiple Vulnerabilities

8 February 2016

The contentAjaxQuery class suffers from a SQL-Injection vulnerability because the request parameter "query" is used to build a sql query without beeing properly sanitized. In order to exploit this issue, an attaccker must be logged into the application as a non-privileged user.


ProjectSend multiple vulnerabilities

26 January 2016

ProjectSend (previously cFTP) suffers from multiple vulnerabilities


Lychee remote code execution

15 April 2015

Lychee version 2.7.1 and probably below suffers from remote code execution vulnerability. The vulnerability resides in the importUrl function that fails to restrict file types due to the lack of file extension validation. Since the imported file is stored in a web-readable directory where php files can be executed, remote code execution can be achieved.


DokuWiki persistent Cross Site Scripting

23 March 2015

DokuWiki version 2014-09-29c (and probably prior) is vulnerable to Persistent Cross Site Scriptng in the admin page. An attacker may use this vulnerability to execute javascript in the context of a logged admin user. Since the vulnerable page has forms with the CSRF token (the same for all requests), a full backend compromise may be possible.


Multiple vulnerabilities in LogAnalyzer

23 May 2012

LogAnalyzer version 3.4.2 and probably below suffers from multiple vulnerabilities


OSClass directory traversal vulnerability

7 March 2012

OSClass version 2.3.5 and probably below suffers from a directory traversal vulnerability that leads to arbitrary file upload and information disclosure.


Multiple vulnerabilities in OSClass

27 January 2012

OSClass version 2.3.4 and probably below suffers from multiple vulnerabilities


Multiple vulnerabilities in postfixadmin

26 January 2012

postfixadmin version 2.3.4 and probably below suffers from multiple vulnerabilities


Mibew messenger multiple XSS

24 January 2012

Mibew messenger version 1.6.4 an probably below is vulnerable to multiple XSS (and persistent XSS). They are all an POSTs and can be exploited due to the lack of CSRF protection


Secunia Security Advisory 29675

Posted Apr 16, 2008

Secunia Security Advisory – poplix has reported some vulnerabilities in Parallels VZPP, which can be exploited by malicious people to conduct cross-site request forgery attacks and potentially compromise a vulnerable system.


Secunia Security Advisory 28239

Posted Dec 28, 2007

Secunia Security Advisory – poplix has discovered a vulnerability in PDFlib, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.


pdflib-overflows.txt

Posted Dec 24, 2007

pdflib, a library used for generating PDFs on the fly, suffers from multiple buffer overflow vulnerabilities due to the use of strcpy().


gmailsteal_remote.scpt.txt

Posted Sep 30, 2007

This script can be used to steal G-Mail’s keychained password by injecting javascript into Safari. When executed it opens G-Mail’s login page, reads the saved password and sends it to a logging server by creating an hidden iframe into G-Mail’s page.


cotv2-dos.txt

Posted Feb 6, 2007

cotv 2.0 suffers from a client-side denial of service vulnerability due to a lack of validation. Demonstration exploit included.


Secunia Security Advisory 23332

Posted Dec 14, 2006

Secunia Security Advisory – poplix has reported a vulnerability in D-LINK DWL-2000AP+, which can be exploited by malicious people to cause a DoS (Denial of Service).


Secunia Security Advisory 22674

Posted Nov 3, 2006

Secunia Security Advisory – poplix has discovered a vulnerability in iodine’s client, which can be exploited by malicious people to compromise a user’s system.


eNM-0.0.1.txt

Posted Oct 31, 2006

easy notes manager (eNM) version 0.0.1 is affected by multiple SQL injection issues. POC included that demonstrates how to bypass authentication.