Latest Exploits / Tools

Latest Exploits

  • Wed, 23 Apr 2014 21:40:22 +0000: dompdf 0.6.0 Arbitrary File Read - Exploit Files ≈ Packet Storm
    dompdf version 0.6.0 suffers from an arbitrary file read vulnerability.
  • Wed, 23 Apr 2014 21:37:27 +0000: AirPhoto WebDisk 4.1.0 Code Execution - Exploit Files ≈ Packet Storm
    AirPhoto WebDisk version 4.1.0 for iOS suffers from a code execution vulnerability.
  • Wed, 23 Apr 2014 21:28:05 +0000: WD Arkeia Virtual Appliance Directory Traversal / Command Execution - Exploit Files ≈ Packet Storm
    WD Arkeia Virtual Appliance versions 7.0.3 up to 10.2.8 suffer from directory traversal and remote command execution vulnerabilities.
  • Wed, 23 Apr 2014 19:22:22 +0000: Livetecs Timelive 6.2.71 Unauthenticated File Upload - Exploit Files ≈ Packet Storm
    Livetecs Timelive version 6.2.71 suffers from a remote unauthenticated file upload vulnerability.
  • Wed, 23 Apr 2014 14:44:44 +0000: Livetecs Timelive 6.2.71 Unauthenticated Access - Exploit Files ≈ Packet Storm
    Livetecs Timelive version 6.2.71 allows for unauthenticated access to sensitive information and functionality.
  • Wed, 23 Apr 2014 14:04:44 +0000: CMS Softgov Cross Site Scripting - Exploit Files ≈ Packet Storm
    CMS Softgov suffers from a cross site scripting vulnerability.
  • Wed, 23 Apr 2014 13:03:33 +0000: Mass Bleed 20140423 - Exploit Files ≈ Packet Storm
    This is a shell script that uses unicornscan, the heartbleed proof of concept, nmap, and various other tools in order to do a mass scan for vulnerable SSL instances.
  • Wed, 23 Apr 2014 12:22:22 +0000: IBM Server RAID Manager Browser Edition Blind SQL Injection - Exploit Files ≈ Packet Storm
    IBM Server RAID Manager Browser Edition version 1.2 suffers from a remote blind SQL injection vulnerability.
  • Wed, 23 Apr 2014 06:15:25 +0000: Bleed Out Heartbleed Command Line Tool 1.0.1.46 - Exploit Files ≈ Packet Storm
    Bleed Out is a command line tool written in C# for targeting instances of OpenSSL made vulnerable by the prolific "Heartbleed" bug. The tool aggressively exploits the OpenSSL vulnerability, dumping both ASCII and binary data to files. It also checks the uniqueness of each chunk before persisting it, to ensure that duplicate chunks are not saved.
  • Tue, 22 Apr 2014 23:58:49 +0000: iDevAffiliate 5.x SQL Injection - Exploit Files ≈ Packet Storm
    iDevAffiliate versions 5.x and below suffer from a remote SQL injection vulnerability.
  • Tue, 22 Apr 2014 23:43:24 +0000: Symantec Messaging Gateway 10.5.1 Cross Site Scripting - Exploit Files ≈ Packet Storm
    Symantec Messaging Gateway version 10.5.1 suffers from a reflective cross site scripting vulnerability.
  • Tue, 22 Apr 2014 22:22:22 +0000: Sixnet Sixview 2.4.1 Directory Traversal - Exploit Files ≈ Packet Storm
    Sixnet Sixview version 2.4.1 suffers from a directory traversal vulnerability.
  • Tue, 22 Apr 2014 17:02:22 +0000: No-CMS 0.6.6 Rev 1 Account Hijack / Remote Command Execution - Exploit Files ≈ Packet Storm
    No-CMS version 0.6.6 revision 1 administrative account hijacking and remote command execution exploit that leverages a static encryption key.
  • Tue, 22 Apr 2014 10:22:22 +0000: Parallels Plesk Panel 12.x Key Disclosure - Exploit Files ≈ Packet Storm
    Parallels Plesk Panel version 12.x for Linux discloses /etc/psa/private/secret_key as an MD5 hash allowing for offline attacks to crack it.
  • Mon, 21 Apr 2014 20:21:21 +0000: Comtrend CT 5361T Cross Site Request Forgery / Cross Site Scripting - Exploit Files ≈ Packet Storm
    Comtrend CT 5361T suffers from cross site request forgery and cross site scripting vulnerabilities.
  • Mon, 21 Apr 2014 20:17:37 +0000: MODx Blind SQL Injection - Exploit Files ≈ Packet Storm
    MODx versions prior to 2.2.14 suffer from multiple remote blind SQL injection vulnerabilities.
  • Mon, 21 Apr 2014 14:44:44 +0000: kitForm 0.43 SQL Injection - Exploit Files ≈ Packet Storm
    kitForm versions 0.43 and below from phpManufaktur suffers from a remote SQL injection vulnerability.
  • Mon, 21 Apr 2014 09:33:33 +0000: Media Player Classic 1.3.1752.0 / 1.3.1249.0 Memory Corruption - Exploit Files ≈ Packet Storm
    Media Player Classic versions 1.3.1752.0 and 1.3.1249.0 suffer from a memory corruption vulnerability.
  • Mon, 21 Apr 2014 08:32:32 +0000: CGR BRASIL CMS SQL Injection - Exploit Files ≈ Packet Storm
    CGR BRASIL CMS suffers from a remote SQL injection vulnerability.
  • Sun, 20 Apr 2014 20:32:32 +0000: Teracom Modem T2-B-Gawv1.4U10Y-BI Cross Site Request Forgery - Exploit Files ≈ Packet Storm
    Teracom Modem version T2-B-Gawv1.4U10Y-BI suffers from a cross site request forgery vulnerability.

Latest Tools

  • Mon, 21 Apr 2014 20:27:16 +0000: OpenStego Free Steganography Solution 0.6.1 - Security Tool Files ≈ Packet Storm
    OpenStego is a tool implemented in Java for generic steganography, with support for password-based encryption of the data. It supports plugins for various steganographic algorithms (currently, only Least Significant Bit algorithm is supported for images). Both source and jar releases are in this tarball.
  • Thu, 17 Apr 2014 22:09:19 +0000: AIEngine 0.6 - Security Tool Files ≈ Packet Storm
    AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.
  • Wed, 16 Apr 2014 20:53:16 +0000: Nmap Port Scanner 6.45 - Security Tool Files ≈ Packet Storm
    Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.
  • Mon, 14 Apr 2014 23:44:44 +0000: Fwknop Port Knocking Utility 2.6.1 - Security Tool Files ≈ Packet Storm
    fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.
  • Sat, 12 Apr 2014 03:34:37 +0000: OpenDNSSEC 1.4.5 - Security Tool Files ≈ Packet Storm
    OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.
  • Fri, 11 Apr 2014 01:12:56 +0000: Tor-ramdisk i686 UClibc-based Linux Distribution x86 20140409 - Security Tool Files ≈ Packet Storm
    Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.
  • Fri, 11 Apr 2014 01:12:06 +0000: Lynis Auditing Tool 1.5.0 - Security Tool Files ≈ Packet Storm
    Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
  • Thu, 10 Apr 2014 23:03:33 +0000: Zed Attack Proxy 2.3.0 Windows Installer - Security Tool Files ≈ Packet Storm
    The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Windows installer.
  • Thu, 10 Apr 2014 22:48:22 +0000: Zed Attack Proxy 2.3.0 Linux Release - Security Tool Files ≈ Packet Storm
    The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Linux release.
  • Thu, 10 Apr 2014 22:45:44 +0000: Zed Attack Proxy 2.3.0 Mac OS X Release - Security Tool Files ≈ Packet Storm
    The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Mac OS X release.
  • Thu, 10 Apr 2014 15:44:44 +0000: sn00p 0.8 - Security Tool Files ≈ Packet Storm
    sn00p is a modular tool written in bourne shell and designed to chain and automate security tools and tests. It parses target definitions from the command line and runs corresponding modules afterwards. sn00p can also parse a given nmap logfile for open tcp and udp ports. All results will be logged in specified directories and a report can subsequently be generated.
  • Thu, 10 Apr 2014 11:11:11 +0000: DNS Spider Multithreaded Bruteforcer 0.5 - Security Tool Files ≈ Packet Storm
    DNS Spider is a multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.
  • Wed, 09 Apr 2014 23:22:44 +0000: GNUnet P2P Framework 0.10.1 - Security Tool Files ≈ Packet Storm
    GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.
  • Wed, 09 Apr 2014 23:19:23 +0000: CodeCrypt 1.6 - Security Tool Files ≈ Packet Storm
    codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.
  • Wed, 09 Apr 2014 02:05:25 +0000: Heartbleed Honeypot Script - Security Tool Files ≈ Packet Storm
    This Perl script listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's ([email protected]) demo for CVE-2014-0160 'Heartbleed'. Run as root for the privileged port. Outputs IPs of suspected heartbleed scan to the console. Rickrolls scanner in the hex dump.
  • Mon, 07 Apr 2014 22:55:28 +0000: OpenSSL Toolkit 1.0.1g - Security Tool Files ≈ Packet Storm
    OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.
  • Thu, 03 Apr 2014 22:03:33 +0000: Lynis Auditing Tool 1.4.9 - Security Tool Files ≈ Packet Storm
    Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
  • Thu, 03 Apr 2014 13:02:22 +0000: Sysdig Exploration Tool - Security Tool Files ≈ Packet Storm
    Sysdig captures system calls and other system level events using a linux kernel facility called tracepoints, which means much less overhead than strace. It then "packetizes" this information, so that you can save it into trace files and filter it, a bit like you would do with tcpdump. This makes it very flexible to explore what processes are doing. Sysdig is also packed with a set of scripts that make it easier to extract useful information and do troubleshooting.
  • Wed, 02 Apr 2014 20:22:22 +0000: Capstone 2.1.2 - Security Tool Files ≈ Packet Storm
    Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more.
  • Tue, 01 Apr 2014 23:02:22 +0000: Aircrack-ng Wireless Network Tools 1.2 Beta 3 - Security Tool Files ≈ Packet Storm
    aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

@Risk Exploits

  • : SANSFIRE 2011 - @RISK: The Consensus Security Alert
    SANSFIRE 2011

ExploitDB