Latest Exploits / Tools

Latest Exploits

  • Thu, 23 Oct 2014 22:49:38 +0000: Centreon SQL / Command Injection - Exploit Files ≈ Packet Storm
    This Metasploit module exploits several vulnerabilities on Centreon 2.5.1 and prior and Centreon Enterprise Server 2.2 and prior. Due to a combination of SQL injection and command injection in the displayServiceStatus.php component, it is possible to execute arbitrary commands as long as there is a valid session registered in the centreon.session table. In order to have a valid session, all it takes is a successful login from anybody. The exploit itself does not require any authentication. This Metasploit module has been tested successfully on Centreon Enterprise Server 2.2.
  • Thu, 23 Oct 2014 22:28:51 +0000: OpenBSD 5.5 Local Kernel Panic - Exploit Files ≈ Packet Storm
    OpenBSD versions 5.5 and below local kernel panic proof of concept exploit for i386.
  • Thu, 23 Oct 2014 22:26:04 +0000: Dell SonicWall GMS 7.2.x Script Insertion - Exploit Files ≈ Packet Storm
    Dell SonicWall GMS version 7.2.x suffers from a script insertion vulnerability.
  • Thu, 23 Oct 2014 22:13:03 +0000: WordPress CP Multi View Event Calendar 1.01 SQL Injection - Exploit Files ≈ Packet Storm
    WordPress CP Multi View Event Calendar plugin version 1.01 suffers from a remote SQL injection vulnerability.
  • Thu, 23 Oct 2014 22:02:22 +0000: WordPress / Joomla Creative Contact Form 0.9.7 Shell Upload - Exploit Files ≈ Packet Storm
    WordPress / Joomla Creative Contact Form plugin versions 0.9.7 and below suffer from a remote shell upload vulnerability.
  • Thu, 23 Oct 2014 21:44:44 +0000: Free WMA MP3 Converter 1.8 SEH Buffer Overflow - Exploit Files ≈ Packet Storm
    Free WMA MP3 Converter version 1.8 SEH buffer overflow exploit.
  • Thu, 23 Oct 2014 20:02:22 +0000: Free WMA MP3 Converter 1.8 Buffer Overflow - Exploit Files ≈ Packet Storm
    Free WMA MP3 Converter version 1.8 buffer overflow exploit.
  • Thu, 23 Oct 2014 10:22:22 +0000: Wonderful World-Wide CMS SQL Injection / Default Credentials - Exploit Files ≈ Packet Storm
    Wonderful World-Wide CMS suffers from having default administrative credentials and a remote SQL injection vulnerability.
  • Wed, 22 Oct 2014 19:53:20 +0000: iFunBox Free 1.1 Local File Inclusion - Exploit Files ≈ Packet Storm
    iFunBox Free version 1.1 suffers from a local file inclusion vulnerability.
  • Wed, 22 Oct 2014 19:48:37 +0000: DotNetNuke DNNspot Store (UploadifyHandler.ashx) 3.0.0 File Upload - Exploit Files ≈ Packet Storm
    This Metasploit module exploits an arbitrary file upload vulnerability found in DotNetNuke DNNspot Store module versions below 3.0.0.
  • Wed, 22 Oct 2014 19:41:56 +0000: File Manager 4.2.10 Code Execution - Exploit Files ≈ Packet Storm
    File Manager version 4.2.10 suffers from a code execution vulnerability.
  • Wed, 22 Oct 2014 19:40:28 +0000: Mulesoft ESB Runtime 3.5.1 Privilege Escalation / Code Execution - Exploit Files ≈ Packet Storm
    Mulesoft ESB Runtime version 3.5.1 suffers from an authenticated privilege escalation vulnerability that can lead to remote code execution.
  • Tue, 21 Oct 2014 21:46:52 +0000: FileBug 1.5.1 Directory Traversal - Exploit Files ≈ Packet Storm
    FileBug version 1.5.1 suffers from a directory traversal vulnerability.
  • Tue, 21 Oct 2014 21:36:51 +0000: Files Document And PDF 2.0.2 Command Execution / Local File Inclusion - Exploit Files ≈ Packet Storm
    Files Document and PDF version 2.0.2 suffers from a local file inclusion and multiple command execution vulnerabilities.
  • Tue, 21 Oct 2014 20:34:55 +0000: WordPress Database Manager 2.7.1 Command Injection / Credential Leak - Exploit Files ≈ Packet Storm
    WordPress Database Manager plugin version 2.7.1 suffers from remote command injection and credential leakage vulnerabilities.
  • Tue, 21 Oct 2014 20:31:22 +0000: Incredible PBX 11 2.0.6.5.0 Remote Command Execution - Exploit Files ≈ Packet Storm
    Incredible PBX 11 version 2.0.6.5.0 suffers from a remote command execution vulnerability.
  • Tue, 21 Oct 2014 02:43:59 +0000: Numara / BMC Track-It! FileStorageService Arbitrary File Upload - Exploit Files ≈ Packet Storm
    This Metasploit module exploits an arbitrary file upload vulnerability in Numara / BMC Track-It! v8 to v11.X. The application exposes the FileStorageService .NET remoting service on port 9010 (9004 for version 8) which accepts unauthenticated uploads. This can be abused by a malicious user to upload a ASP or ASPX file to the web root leading to arbitrary code execution as NETWORK SERVICE or SYSTEM. This Metasploit module has been tested successfully on versions 11.3.0.355, 10.0.51.135, 10.0.50.107, 10.0.0.143, 9.0.30.248 and 8.0.2.51.
  • Tue, 21 Oct 2014 02:43:46 +0000: Joomla Akeeba Kickstart Unserialize Remote Code Execution - Exploit Files ≈ Packet Storm
    This Metasploit module exploits a vulnerability found in Joomla! through 2.5.25, 3.2.5 and earlier 3.x versions and 3.3.0 through 3.3.4 versions. The vulnerability affects the Akeeba component, which is responsible for Joomla! updates. Nevertheless it is worth to note that this vulnerability is only exploitable during the update of the Joomla! CMS.
  • Tue, 21 Oct 2014 02:42:32 +0000: HP Data Protector EXEC_INTEGUTIL Remote Code Execution - Exploit Files ≈ Packet Storm
    This exploit abuses a vulnerability in the HP Data Protector. The vulnerability exists in the Backup client service, which listens by default on TCP/5555. The EXEC_INTEGUTIL request allows to execute arbitrary commands from a restricted directory. Since it includes a perl executable, it's possible to use an EXEC_INTEGUTIL packet to execute arbitrary code. On linux targets, the perl binary isn't on the restricted directory, but an EXEC_BAR packet can be used to access the perl binary, even in the last version of HP Data Protector for linux. This Metasploit module has been tested successfully on HP Data Protector 9 over Windows 2008 R2 64 bits and CentOS 6 64 bits.
  • Tue, 21 Oct 2014 02:39:57 +0000: Windows OLE Package Manager SandWorm Exploit - Exploit Files ≈ Packet Storm
    Proof of concept exploit builder for the OLE flaw in packager.dll.

Latest Tools

  • Thu, 23 Oct 2014 23:12:18 +0000: Tor-ramdisk i686 UClibc-based Linux Distribution x86_64 20141022 - Security Tool Files ≈ Packet Storm
    Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.
  • Thu, 23 Oct 2014 22:55:34 +0000: Tor-ramdisk i686 UClibc-based Linux Distribution x86 20141022 - Security Tool Files ≈ Packet Storm
    Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86 version.
  • Thu, 23 Oct 2014 11:11:11 +0000: OpenSSL 6.7p1 bl0wsshd00r67p1 Backdoor - Security Tool Files ≈ Packet Storm
    bl0wsshd00r backdoors OpenSSH 6.7p1 with a magic password for any user, sniffs and records traffic, and mitigates logging to lastlog/wtmp/utmp.
  • Wed, 22 Oct 2014 20:08:35 +0000: Packet Fence 4.5.0 - Security Tool Files ≈ Packet Storm
    PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
  • Tue, 21 Oct 2014 21:57:08 +0000: TOR Virtual Network Tunneling Tool 0.2.4.25 - Security Tool Files ≈ Packet Storm
    Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
  • Mon, 20 Oct 2014 18:32:22 +0000: AIEngine 0.10 - Security Tool Files ≈ Packet Storm
    AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.
  • Thu, 16 Oct 2014 08:22:22 +0000: WordPress Brute Forcer - Security Tool Files ≈ Packet Storm
    This is a python script that performs brute forcing against WordPress installs using a wordlist.
  • Wed, 15 Oct 2014 23:27:58 +0000: OpenSSL Toolkit 1.0.1j - Security Tool Files ≈ Packet Storm
    OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.
  • Wed, 15 Oct 2014 08:37:21 +0000: Lynis Auditing Tool 1.6.3 - Security Tool Files ≈ Packet Storm
    Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
  • Tue, 07 Oct 2014 23:53:12 +0000: Mobius Forensic Toolkit 0.5.21 - Security Tool Files ≈ Packet Storm
    Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.
  • Tue, 07 Oct 2014 23:48:19 +0000: OpenSSH 6.7p1 - Security Tool Files ≈ Packet Storm
    This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.
  • Mon, 06 Oct 2014 23:05:12 +0000: Mandos Encrypted File System Unattended Reboot Utility 1.6.9 - Security Tool Files ≈ Packet Storm
    The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.
  • Fri, 03 Oct 2014 01:26:31 +0000: oclHashcat For NVidia 1.31 - Security Tool Files ≈ Packet Storm
    oclHashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. NVidia version.
  • Fri, 03 Oct 2014 01:17:40 +0000: oclHashcat For AMD 1.31 - Security Tool Files ≈ Packet Storm
    oclHashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. AMD version.
  • Thu, 02 Oct 2014 00:36:34 +0000: Chatroom Client / Server With AES Encryption Support - Security Tool Files ≈ Packet Storm
    This is a chat system composed of a TCP/IP server daemon in C and its corresponding java client. You can chat with other peers in clear text or AES password based encryption on your own computer network. The AES password encryption and decryption functions is based on 128 bit key which is padded using SHA-256 applied to the provided password. Further details with instructions in README file.
  • Sat, 27 Sep 2014 16:59:52 +0000: Tor-ramdisk i686 UClibc-based Linux Distribution x86 20140925 - Security Tool Files ≈ Packet Storm
    Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.
  • Fri, 26 Sep 2014 12:23:22 +0000: Hakabana 0.2.1 - Security Tool Files ≈ Packet Storm
    Hakabana is an open source monitoring tool that helps you visualize network traffic using Haka and Kibana.
  • Thu, 25 Sep 2014 15:41:30 +0000: TOR Virtual Network Tunneling Tool 0.2.4.24 - Security Tool Files ≈ Packet Storm
    Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
  • Wed, 24 Sep 2014 16:09:39 +0000: IPTables Bash Completion 1.3 - Security Tool Files ≈ Packet Storm
    iptables-bash_completion provides programmable completion for the iptables and ip6tables programs from netfilter.org. Following the logic of iptables, options are shown only if they are valid at the current context. Additionally to the completion on options, matches and targets, it supports dynamic retrieval of data from the system i.e: chain-, set-names, interfaces, hostnames, etc. Environment variables allow to fine grade completion options. IP and MAC addresses can be fed by file.
  • Wed, 24 Sep 2014 16:07:02 +0000: IPSet List 3.2.1 - Security Tool Files ≈ Packet Storm
    ipset_list is a wrapper script for listing sets of the netfilter ipset program. It allows you to match and display sets, headers, and elements in various ways. Optionally, the output can be colorized.

@Risk Exploits

  • : SANSFIRE 2011 - @RISK: The Consensus Security Alert
    SANSFIRE 2011

ExploitDB