Latest Exploits / Tools

Latest Exploits

  • Thu, 21 Aug 2014 14:02:22 +0000: MyBB 1.8 Beta 3 Cross Site Scripting / SQL Injection - Exploit Files ≈ Packet Storm
    MyBB version 1.8 Beta 3 suffers from cross site scripting and remote SQL injection vulnerabilities.
  • Thu, 21 Aug 2014 10:11:11 +0000: Dashing Times SQL Injection - Exploit Files ≈ Packet Storm
    Content management systems designed by Dashing Times appear susceptible to remote SQL injection vulnerabilities.
  • Wed, 20 Aug 2014 15:32:26 +0000: WordPress All In One SEO Pack 2.2.2 Cross Site Scripting - Exploit Files ≈ Packet Storm
    WordPress All In One SEO Packet plugin version 2.2.2 suffers from a persistent cross site scripting vulnerability.
  • Wed, 20 Aug 2014 15:30:06 +0000: ArticleFR 3.0.4 SQL Injection - Exploit Files ≈ Packet Storm
    ArticleFR version 3.0.4 suffers from a remote SQL injection vulnerability.
  • Wed, 20 Aug 2014 15:25:39 +0000: ManageEngine Desktop Central / Password Manager Pro / IT360 SQL Injection - Exploit Files ≈ Packet Storm
    ManageEngine Desktop Central, Password Manager Pro, and IT360 suffer from remote blind SQL injection vulnerabilities. Metasploit module included.
  • Wed, 20 Aug 2014 00:00:56 +0000: HybridAuth install.php PHP Code Execution - Exploit Files ≈ Packet Storm
    This Metasploit module exploits a PHP code execution vulnerability in HybridAuth versions 2.0.9 to 2.2.2. The install file 'install.php' is not removed after installation allowing unauthenticated users to write PHP code to the application configuration file 'config.php'. Note: This exploit will overwrite the application configuration file rendering the application unusable.
  • Tue, 19 Aug 2014 23:51:14 +0000: BlazeDVD Pro 7.0 Buffer Overflow - Exploit Files ≈ Packet Storm
    BlazeDVD Pro version 7.0 SEH buffer overflow exploit written in python.
  • Tue, 19 Aug 2014 23:04:44 +0000: Bulletproof FTP Client 2010 Buffer Overflow - Exploit Files ≈ Packet Storm
    Bulletproof FTP Client 2010 SEH buffer overflow exploit written in python.
  • Mon, 18 Aug 2014 18:22:20 +0000: Gitlab-shell Code Execution - Exploit Files ≈ Packet Storm
    This Metasploit module takes advantage of the addition of authorized ssh keys in the gitlab-shell functionality of Gitlab. Versions of gitlab-shell prior to 1.7.4 used the ssh key provided directly in a system call resulting in a command injection vulnerability. As this relies on adding an ssh key to an account valid credentials are required to exploit this vulnerability.
  • Mon, 18 Aug 2014 18:20:52 +0000: Firefox toString console.time Privileged Javascript Injection - Exploit Files ≈ Packet Storm
    This Metasploit module gains remote code execution on Firefox 15-22 by abusing two separate Javascript-related vulnerabilities to ultimately inject malicious Javascript code into a context running with chrome:// privileges.
  • Mon, 18 Aug 2014 18:11:30 +0000: Senkas Kolibri WebServer 2.0 Buffer Overflow - Exploit Files ≈ Packet Storm
    Senkas Kolibri WebServer version 2.0 is vulnerable to remote code execution via an overly long POST request. Sending the exploit will result in a SEH overwrite, which can then be use to redirect execution to a POP POP RET within the application's binary itself, which once executed, will allow the attacker to execute his/her payload located in the HOST field.
  • Mon, 18 Aug 2014 18:03:09 +0000: Tenda A5s Router Authentication Bypass - Exploit Files ≈ Packet Storm
    Tenda A5s router suffers from an authentication bypass vulnerability due to improperly trusting cookies.
  • Sun, 17 Aug 2014 03:33:33 +0000: Webasyst Shop Script 5.2.2.30933 Cross Site Scripting - Exploit Files ≈ Packet Storm
    Webasuyst Shop Script version 5.2.2.30933 suffers from a persistent cross site scripting vulnerability.
  • Fri, 15 Aug 2014 16:44:44 +0000: RiverBed Stingray Traffic Manager 9.6 Cross Site Scripting - Exploit Files ≈ Packet Storm
    RiverBed Stingray Traffic Manager virtual appliance version 9.6 suffers from a cross site scripting vulnerability.
  • Fri, 15 Aug 2014 12:22:22 +0000: LY Website CMS SQL Injection - Exploit Files ≈ Packet Storm
    LY Website CMS suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.
  • Thu, 14 Aug 2014 02:30:05 +0000: VirtualBox 3D Acceleration Virtual Machine Escape - Exploit Files ≈ Packet Storm
    This Metasploit module exploits a vulnerability in the 3D Acceleration support for VirtualBox. The vulnerability exists in the remote rendering of OpenGL-based 3D graphics. By sending a sequence of specially crafted of rendering messages, a virtual machine can exploit an out of bounds array access to corrupt memory and escape to the host. This Metasploit module has been tested successfully on Windows 7 SP1 (64 bits) as Host running Virtual Box 4.3.6.
  • Thu, 14 Aug 2014 02:28:56 +0000: VMTurbo Operations Manager 4.6 vmtadmin.cgi Remote Command Execution - Exploit Files ≈ Packet Storm
    VMTurbo Operations Manager 4.6 and prior are vulnerable to unauthenticated OS Command injection in the web interface. Use reverse payloads for the most reliable results. Since it is a blind OS command injection vulnerability, there is no output for the executed command when using the cmd generic payload. Port binding payloads are disregarded due to the restrictive firewall settings. This Metasploit module has been tested successfully on VMTurbo Operations Manager versions 4.5 and 4.6.
  • Thu, 14 Aug 2014 02:22:28 +0000: Jamroom 5.2.6 Cross Site Scripting - Exploit Files ≈ Packet Storm
    Jamroom version 5.2.6 suffers from a reflective cross site scripting vulnerability.
  • Wed, 13 Aug 2014 20:22:22 +0000: Disqus 2.7.5 Cross Site Request Forgery / Cross Site Scripting - Exploit Files ≈ Packet Storm
    Cross site request forgery exploit for Disqus for WordPress versions up to 2.7.5 that adds a stored cross site scripting attack.
  • Wed, 13 Aug 2014 17:22:22 +0000: Ribose Cross Site Request Forgery - Exploit Files ≈ Packet Storm
    The Ribose Online Social Collaboration Platform suffers from a cross site request forgery vulnerability.

Latest Tools

  • Thu, 21 Aug 2014 20:21:40 +0000: oclHashcat For AMD 1.30.7 - Security Tool Files ≈ Packet Storm
    oclHashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. AMD version.
  • Thu, 21 Aug 2014 20:17:47 +0000: oclHashcat For NVidia 1.30.7 - Security Tool Files ≈ Packet Storm
    oclHashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. NVidia version.
  • Tue, 19 Aug 2014 23:54:11 +0000: Maligno 1.2 - Security Tool Files ≈ Packet Storm
    Maligno is an open source penetration testing tool written in python, that serves Metasploit payloads. It generates shellcode with msfvenom and transmits it over HTTP or HTTPS. The shellcode is encrypted with AES and encoded with Base64 prior to transmission.
  • Tue, 19 Aug 2014 16:04:44 +0000: Melkor ELF Fuzzer 1.0 - Security Tool Files ≈ Packet Storm
    Melkor is an ELF fuzzer that mutates the existing data in an ELF sample given to create orcs (malformed ELFs), however, it does not change values randomly (dumb fuzzing), instead, it fuzzes certain metadata with semi-valid values through the use of fuzzing rules (knowledge base). Written in C, Melkor is a very intuitive and easy-to-use fuzzer to find functional (and security) bugs in ELF parsers.
  • Mon, 18 Aug 2014 17:58:25 +0000: Viproy VoIP Penetration / Exploitation Kit 2.0 - Security Tool Files ≈ Packet Storm
    Viproy Voip Penetration and Exploitation Kit is developed to improve quality of SIP penetration testing. It provides authentication and trust analysis features that assists in creating simple tests.
  • Sat, 16 Aug 2014 00:08:56 +0000: GnuPG 2.0.26 - Security Tool Files ≈ Packet Storm
    GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.
  • Tue, 12 Aug 2014 02:04:45 +0000: I2P 0.9.14.1 - Security Tool Files ≈ Packet Storm
    I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
  • Tue, 12 Aug 2014 02:01:34 +0000: Suricata IDPE 2.0.3 - Security Tool Files ≈ Packet Storm
    Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
  • Thu, 07 Aug 2014 19:49:10 +0000: Samhain File Integrity Checker 3.1.2 - Security Tool Files ≈ Packet Storm
    Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.
  • Thu, 07 Aug 2014 12:33:33 +0000: Mandos Encrypted File System Unattended Reboot Utility 1.6.8 - Security Tool Files ≈ Packet Storm
    The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.
  • Wed, 06 Aug 2014 23:55:55 +0000: OpenSSL Toolkit 1.0.1i - Security Tool Files ≈ Packet Storm
    OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.
  • Mon, 04 Aug 2014 22:01:19 +0000: Adobe ColdFusion MX6 Password Decryptor - Security Tool Files ≈ Packet Storm
    This tool enables you to retrieve the plain text password for ColdFusion MX6.
  • Mon, 04 Aug 2014 21:59:56 +0000: Tenshi Log Monitoring Program 0.15 - Security Tool Files ≈ Packet Storm
    tenshi is a log monitoring program, designed to watch one or more log files for lines matching user defined regular expressions and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.
  • Sun, 03 Aug 2014 15:18:35 +0000: IPTables Bash Completion 1.2 - Security Tool Files ≈ Packet Storm
    iptables-bash_completion provides programmable completion for the iptables and ip6tables programs from netfilter.org. Following the logic of iptables, options are shown only if they are valid at the current context. Additionally to the completion on options, matches and targets, it supports dynamic retrieval of data from the system i.e: chain-, set-names, interfaces, hostnames, etc. Environment variables allow to fine grade completion options. IP and MAC addresses can be fed by file.
  • Sat, 02 Aug 2014 00:31:38 +0000: Tor-ramdisk i686 UClibc-based Linux Distribution x86 20140801 - Security Tool Files ≈ Packet Storm
    Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.
  • Thu, 31 Jul 2014 20:22:22 +0000: Lynis Auditing Tool 1.5.9 - Security Tool Files ≈ Packet Storm
    Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
  • Wed, 30 Jul 2014 23:37:04 +0000: Fwknop Port Knocking Utility 2.6.3 - Security Tool Files ≈ Packet Storm
    fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.
  • Wed, 30 Jul 2014 00:21:33 +0000: I2P 0.9.14 - Security Tool Files ≈ Packet Storm
    I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
  • Wed, 30 Jul 2014 00:14:01 +0000: OpenDNSSEC 1.4.6 - Security Tool Files ≈ Packet Storm
    OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.
  • Tue, 29 Jul 2014 23:09:16 +0000: TOR Virtual Network Tunneling Tool 0.2.4.23 - Security Tool Files ≈ Packet Storm
    Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

@Risk Exploits

  • : SANSFIRE 2011 - @RISK: The Consensus Security Alert
    SANSFIRE 2011

ExploitDB