Latest Exploits / Tools

Latest Exploits

  • Wed, 16 Apr 2014 20:58:48 +0000: SAP Router Password Timing Attack - Exploit Files ≈ Packet Storm
    Core Security Technologies Advisory - SAP Router is an application-level gateway used to connect systems in a SAP infrastructure. A vulnerability have been found in SAP Router that could allow an unauthenticated remote attacker to obtain passwords used to protect route entries by a timing side-channel attack.
  • Wed, 16 Apr 2014 20:50:09 +0000: MobFox mAdserver 2.0 SQL Injection - Exploit Files ≈ Packet Storm
    MobFox mAdserver version 2.0 suffers from a remote SQL injection vulnerability.
  • Wed, 16 Apr 2014 20:43:45 +0000: Ektron CMS 8.7 Cross Site Scripting - Exploit Files ≈ Packet Storm
    Ektron CMS version 8.7 suffers from a cross site scripting vulnerability.
  • Wed, 16 Apr 2014 09:22:22 +0000: CMS Studio Cross Site Scripting - Exploit Files ≈ Packet Storm
    CMS Studio suffers from a cross site scripting vulnerability.
  • Wed, 16 Apr 2014 00:12:28 +0000: MS14-012 Microsoft Internet Explorer CMarkup Use-After-Free - Exploit Files ≈ Packet Storm
    This Metasploit module exploits an use after free condition on Internet Explorer as used in the wild on the "Operation SnowMan" in February 2014. The module uses Flash Player 12 in order to bypass ASLR and finally DEP.
  • Tue, 15 Apr 2014 23:59:36 +0000: WebTitan 4.01 Command Execution / Directory Traversal - Exploit Files ≈ Packet Storm
    WebTitan version 4.01 suffers from remote command execution and directory traversal vulnerabilities.
  • Tue, 15 Apr 2014 23:55:31 +0000: Unitrends Unauthenticated Root Command Execution - Exploit Files ≈ Packet Storm
    This Metasploit module exploits a remote command execution vulnerability in Unitrends Enterprise Backup version 7.3.0.
  • Tue, 15 Apr 2014 23:03:33 +0000: Xerox DocuShare SQL Injection - Exploit Files ≈ Packet Storm
    Xerox DocuShare suffers from a remote SQL injection vulnerability.
  • Tue, 15 Apr 2014 17:02:22 +0000: lxml Filter Bypass - Exploit Files ≈ Packet Storm
    clean_html in the lxml Python library can be bypassed with non-printable characters.
  • Tue, 15 Apr 2014 10:44:44 +0000: Joomla SMF Cross Site Scripting - Exploit Files ≈ Packet Storm
    The Joomla SMF component suffers from a cross site scripting vulnerability.
  • Tue, 15 Apr 2014 10:32:32 +0000: CMS iCAT Cross Site Scripting - Exploit Files ≈ Packet Storm
    CMS iCAT suffers from a cross site scripting vulnerability.
  • Tue, 15 Apr 2014 10:32:32 +0000: Joomla Wrapper Cross Site Scripting - Exploit Files ≈ Packet Storm
    Joomla Wrapper component suffers from a cross site scripting vulnerability.
  • Tue, 15 Apr 2014 10:22:22 +0000: Netgear N600 Password Disclosure / Account Reset - Exploit Files ≈ Packet Storm
    Netgear N600 suffers from password disclosure and account reset vulnerabilities.
  • Mon, 14 Apr 2014 22:22:22 +0000: PDF Album 1.7 Local File Inclusion - Exploit Files ≈ Packet Storm
    PDF Album version 1.7 for iOS suffers from a local file inclusion vulnerability.
  • Mon, 14 Apr 2014 20:32:32 +0000: HP Insecure RPATH Use - Exploit Files ≈ Packet Storm
    It has been identified that binaries that are executed with elevated privileges (SetGID and SetUID programs) have been compiled in manner that means they searched for libraries in insecure locations. Version 9.40 of HP Array Configuration Utility, HP Array Diagnostics Utility, HP ProLiant Array Diagnostics, and SmartSSD Wear Gauge Utility running on Linux are affected.
  • Mon, 14 Apr 2014 18:02:22 +0000: BMC Patrol For AIX Insecure RPATH Use - Exploit Files ≈ Packet Storm
    It has been identified that binaries that are executed with elevated privileges (SetGID and SetUID programs) have been compiled in manner that means they searched for libraries in insecure locations. Version 3.9.00 of BMC Patrol for AIX is affected.
  • Mon, 14 Apr 2014 13:02:22 +0000: MS14-012 Internet Explorer CMarkup Use-After-Free - Exploit Files ≈ Packet Storm
    Microsoft Internet Explorer CMarkup use-after-free exploit that demonstrates the issue documented in MS14-012.
  • Mon, 14 Apr 2014 10:44:44 +0000: Joomla BeaconDecode Cross Site Scripting - Exploit Files ≈ Packet Storm
    The Joomla BeaconDecode component suffers from a cross site scripting vulnerability.
  • Mon, 14 Apr 2014 10:44:44 +0000: PHP Event Calendar SQL Injection - Exploit Files ≈ Packet Storm
    PHP Event Calendar suffers from a remote SQL injection vulnerability in day_view.php.
  • Mon, 14 Apr 2014 10:22:22 +0000: CMS Int24 SQL Injection - Exploit Files ≈ Packet Storm
    CMS Int24 suffers from a remote SQL injection vulnerability.

Latest Tools

  • Wed, 16 Apr 2014 20:53:16 +0000: Nmap Port Scanner 6.45 - Security Tool Files ≈ Packet Storm
    Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.
  • Mon, 14 Apr 2014 23:44:44 +0000: Fwknop Port Knocking Utility 2.6.1 - Security Tool Files ≈ Packet Storm
    fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.
  • Sat, 12 Apr 2014 03:34:37 +0000: OpenDNSSEC 1.4.5 - Security Tool Files ≈ Packet Storm
    OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.
  • Fri, 11 Apr 2014 01:12:56 +0000: Tor-ramdisk i686 UClibc-based Linux Distribution x86 20140409 - Security Tool Files ≈ Packet Storm
    Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.
  • Fri, 11 Apr 2014 01:12:06 +0000: Lynis Auditing Tool 1.5.0 - Security Tool Files ≈ Packet Storm
    Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
  • Thu, 10 Apr 2014 23:03:33 +0000: Zed Attack Proxy 2.3.0 Windows Installer - Security Tool Files ≈ Packet Storm
    The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Windows installer.
  • Thu, 10 Apr 2014 22:48:22 +0000: Zed Attack Proxy 2.3.0 Linux Release - Security Tool Files ≈ Packet Storm
    The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Linux release.
  • Thu, 10 Apr 2014 22:45:44 +0000: Zed Attack Proxy 2.3.0 Mac OS X Release - Security Tool Files ≈ Packet Storm
    The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Mac OS X release.
  • Thu, 10 Apr 2014 15:44:44 +0000: sn00p 0.8 - Security Tool Files ≈ Packet Storm
    sn00p is a modular tool written in bourne shell and designed to chain and automate security tools and tests. It parses target definitions from the command line and runs corresponding modules afterwards. sn00p can also parse a given nmap logfile for open tcp and udp ports. All results will be logged in specified directories and a report can subsequently be generated.
  • Thu, 10 Apr 2014 11:11:11 +0000: DNS Spider Multithreaded Bruteforcer 0.5 - Security Tool Files ≈ Packet Storm
    DNS Spider is a multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.
  • Wed, 09 Apr 2014 23:22:44 +0000: GNUnet P2P Framework 0.10.1 - Security Tool Files ≈ Packet Storm
    GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.
  • Wed, 09 Apr 2014 23:19:23 +0000: CodeCrypt 1.6 - Security Tool Files ≈ Packet Storm
    codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.
  • Wed, 09 Apr 2014 02:05:25 +0000: Heartbleed Honeypot Script - Security Tool Files ≈ Packet Storm
    This Perl script listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's ([email protected]) demo for CVE-2014-0160 'Heartbleed'. Run as root for the privileged port. Outputs IPs of suspected heartbleed scan to the console. Rickrolls scanner in the hex dump.
  • Mon, 07 Apr 2014 22:55:28 +0000: OpenSSL Toolkit 1.0.1g - Security Tool Files ≈ Packet Storm
    OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.
  • Thu, 03 Apr 2014 22:03:33 +0000: Lynis Auditing Tool 1.4.9 - Security Tool Files ≈ Packet Storm
    Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
  • Thu, 03 Apr 2014 13:02:22 +0000: Sysdig Exploration Tool - Security Tool Files ≈ Packet Storm
    Sysdig captures system calls and other system level events using a linux kernel facility called tracepoints, which means much less overhead than strace. It then "packetizes" this information, so that you can save it into trace files and filter it, a bit like you would do with tcpdump. This makes it very flexible to explore what processes are doing. Sysdig is also packed with a set of scripts that make it easier to extract useful information and do troubleshooting.
  • Wed, 02 Apr 2014 20:22:22 +0000: Capstone 2.1.2 - Security Tool Files ≈ Packet Storm
    Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more.
  • Tue, 01 Apr 2014 23:02:22 +0000: Aircrack-ng Wireless Network Tools 1.2 Beta 3 - Security Tool Files ≈ Packet Storm
    aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).
  • Tue, 01 Apr 2014 17:02:22 +0000: Coloured ELF File Dissector - Security Tool Files ≈ Packet Storm
    This code dissects the internal data structures in ELF files. It supports x86 and x86_64 archs and runs under Linux.
  • Mon, 31 Mar 2014 10:44:44 +0000: Immunity Hooking Script - Security Tool Files ≈ Packet Storm
    This is an Immunity template plugin for function hooking while reverse engineering.

@Risk Exploits

  • : SANSFIRE 2011 - @RISK: The Consensus Security Alert
    SANSFIRE 2011

ExploitDB