Latest Exploits / Tools

Latest Exploits

  • Fri, 14 Aug 2020 21:24:10 +0000: Safari Webkit For iOS 7.1.2 JIT Optimization Bug - Exploit Files ≈ Packet Storm
    This Metasploit module exploits a JIT optimization bug in Safari Webkit. This allows us to write shellcode to an RWX memory section in JavaScriptCore and execute it. The shellcode contains a kernel exploit (CVE-2016-4669) that obtains kernel rw, obtains root and disables code signing. Finally we download and execute the meterpreter payload. This module has been tested against iOS 7.1.2 on an iPhone 4.
  • Fri, 14 Aug 2020 21:18:38 +0000: WordPress Sell Photo 1.0.5 Cross Site Scripting - Exploit Files ≈ Packet Storm
    WordPress Sell Photo plugin version 1.0.5 suffers from a persistent cross site scripting vulnerability.
  • Fri, 14 Aug 2020 16:05:25 +0000: Android App Zygotes Improper Guarding - Exploit Files ≈ Packet Storm
    On Android, app zygotes do not properly guard against UID reuse attacks, leak AID_READPROC, and expose mlstrustedsubject.
  • Fri, 14 Aug 2020 16:03:30 +0000: Artica Proxy 4.3.0 Authentication Bypass - Exploit Files ≈ Packet Storm
    Artica Proxy version 4.3.0 suffers from an authentication bypass vulnerability.
  • Thu, 13 Aug 2020 16:57:39 +0000: vBulletin 5.x Remote Code Execution - Exploit Files ≈ Packet Storm
    This Metasploit module exploits a logic bug within the template rendering code in vBulletin 5.x. The module uses the vBulletin template rendering functionality to render the widget_tabbedcontainer_tab_panel template while also providing the widget_php argument. This causes the former template to load the latter bypassing filters originally put in place to address CVE-2019-16759. This also allows the exploit to reach an eval call with user input allowing the module to achieve PHP remote code execution on the target. This module has been tested successfully on vBulletin version 5.6.2 on Ubuntu Linux.
  • Thu, 13 Aug 2020 16:53:48 +0000: Microsoft Windows AppContainer Enterprise Authentication Capability Bypass - Exploit Files ≈ Packet Storm
    On Microsoft Windows 10 1909, LSASS does not correctly enforce the Enterprise Authentication Capability which allows any AppContainer to perform network authentication with the user's credentials.
  • Thu, 13 Aug 2020 16:52:44 +0000: GetSimple CMS Multi User 1.8.2 Cross Site Request Forgery - Exploit Files ≈ Packet Storm
    GetSimple CMS Multi User plugin version 1.8.2 suffers from multiple cross site request forgery vulnerabilities.
  • Thu, 13 Aug 2020 16:48:32 +0000: QiHang Media Web Digital Signage 3.0.9 Remote Code Execution - Exploit Files ≈ Packet Storm
    QiHang Media Web Digital Signage version 3.0.9 suffers from a pre-authentication remote code execution vulnerability.
  • Thu, 13 Aug 2020 16:47:27 +0000: QiHang Media Web Digital Signage 3.0.9 Arbitrary File Disclosure - Exploit Files ≈ Packet Storm
    QiHang Media Web Digital Signage version 3.0.9 suffers from an arbitrary file disclosure vulnerability.
  • Thu, 13 Aug 2020 16:46:18 +0000: QiHang Media Web Digital Signage 3.0.9 Arbitrary File Deletion - Exploit Files ≈ Packet Storm
    QiHang Media Web Digital Signage version 3.0.9 suffers from an unauthenticated arbitrary file deletion vulnerability.
  • Thu, 13 Aug 2020 16:44:57 +0000: QiHang Media Web Digital Signage 3.0.9 Credential Disclosure - Exploit Files ≈ Packet Storm
    QiHang Media Web Digital Signage version 3.0.9 suffers from a clear-text credential disclosure vulnerability that allows an unauthenticated attacker to issue a request to an unprotected directory that hosts an XML file /xml/User/User.xml and obtain administrative login information that allows for a successful authentication bypass attack.
  • Thu, 13 Aug 2020 16:43:28 +0000: QiHang Media Web Digital Signage 3.0.9 Password Disclosure - Exploit Files ≈ Packet Storm
    QiHang Media Web Digital Signage version 3.0.9 suffers from a cleartext transmission/storage of sensitive information in a cookie. This allows a remote attacker to intercept the HTTP Cookie authentication credentials via a man-in-the-middle attack.
  • Thu, 13 Aug 2020 16:42:30 +0000: Car Rental Script Cross Site Scripting - Exploit Files ≈ Packet Storm
    Car Rental Script from projectworlds.in suffers from a cross site scripting vulnerability. Versions are not provided with this software currently.
  • Thu, 13 Aug 2020 16:41:10 +0000: Car Rental Script SQL Injection - Exploit Files ≈ Packet Storm
    Car Rental Script from projectworlds.in suffers from a remote SQL injection vulnerability. Versions are not provided with this software currently.
  • Thu, 13 Aug 2020 16:40:13 +0000: Online Book Store Cross Site Scripting - Exploit Files ≈ Packet Storm
    Online Book Store from projectworlds.in suffers from a cross site scripting vulnerability. Versions are not provided with this software currently.
  • Thu, 13 Aug 2020 16:38:56 +0000: Online Book Store SQL Injection - Exploit Files ≈ Packet Storm
    Online Book Store from projectworlds.in suffers from a remote SQL injection vulnerability. Versions are not provided with this software currently.
  • Thu, 13 Aug 2020 16:37:17 +0000: Online Shopping System SQL Injection - Exploit Files ≈ Packet Storm
    Online Shopping System from projectworlds.in suffers from a remote SQL injection vulnerability. Versions are not provided with this software currently.
  • Thu, 13 Aug 2020 16:34:53 +0000: vBulletin 5.6.2 Cross Site Scripting - Exploit Files ≈ Packet Storm
    vBulletin version 5.6.2 suffers from a cross site scripting vulnerability.
  • Thu, 13 Aug 2020 16:31:35 +0000: CMS Made Simple 2.2.14 Shell Upload - Exploit Files ≈ Packet Storm
    CMS Made Simple version 2.2.14 suffers from an authenticated shell upload vulnerability.
  • Wed, 12 Aug 2020 16:01:35 +0000: Avian JVM 1.2.0 Silent Return - Exploit Files ≈ Packet Storm
    Avian JVM version 1.2.0 suffers from a silent return issue in the vm::arrayCopy method defined in classpath-common.h, where multiple boundary checks are performed to prevent out-of-bounds memory read/write. One of these boundary checks makes the code return silently when a negative length is provided instead of throwing an exception.

Latest Tools

  • Thu, 13 Aug 2020 16:57:51 +0000: Wireshark Analyzer 3.2.6 - Security Tool Files ≈ Packet Storm
    Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.
  • Mon, 10 Aug 2020 22:51:55 +0000: Zeek 3.2.0 - Security Tool Files ≈ Packet Storm
    Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.
  • Mon, 10 Aug 2020 10:11:11 +0000: Sifter 9.3 - Security Tool Files ≈ Packet Storm
    Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.
  • Tue, 04 Aug 2020 14:55:11 +0000: SQLMAP - Automatic SQL Injection Tool 1.4.8 - Security Tool Files ≈ Packet Storm
    sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.
  • Tue, 04 Aug 2020 11:01:11 +0000: Sifter 9.2 - Security Tool Files ≈ Packet Storm
    Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.
  • Mon, 03 Aug 2020 10:22:11 +0000: Sifter 9.1 - Security Tool Files ≈ Packet Storm
    Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.
  • Sat, 01 Aug 2020 10:51:34 +0000: Samhain File Integrity Checker 4.4.2 - Security Tool Files ≈ Packet Storm
    Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.
  • Fri, 31 Jul 2020 18:22:22 +0000: Sifter 9.01 - Security Tool Files ≈ Packet Storm
    Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.
  • Wed, 29 Jul 2020 17:54:52 +0000: Hydra Network Logon Cracker 9.1 - Security Tool Files ≈ Packet Storm
    THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.
  • Wed, 29 Jul 2020 10:11:11 +0000: Sifter 9 - Security Tool Files ≈ Packet Storm
    Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.
  • Tue, 28 Jul 2020 14:47:33 +0000: Zeek 3.1.5 - Security Tool Files ≈ Packet Storm
    Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.
  • Mon, 27 Jul 2020 18:40:41 +0000: Scapy Packet Manipulation Tool 2.4.4rc2 - Security Tool Files ≈ Packet Storm
    Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.
  • Mon, 27 Jul 2020 18:40:02 +0000: Sifter 8.7 - Security Tool Files ≈ Packet Storm
    Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.
  • Fri, 24 Jul 2020 12:04:44 +0000: Sifter 8.6 - Security Tool Files ≈ Packet Storm
    Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.
  • Thu, 23 Jul 2020 17:36:28 +0000: Sifter 8.5_2 - Security Tool Files ≈ Packet Storm
    Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.
  • Wed, 22 Jul 2020 17:24:01 +0000: Logwatch 7.5.4 - Security Tool Files ≈ Packet Storm
    Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.
  • Mon, 20 Jul 2020 19:36:55 +0000: Scapy Packet Manipulation Tool 2.4.4rc1 - Security Tool Files ≈ Packet Storm
    Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.
  • Mon, 20 Jul 2020 19:22:22 +0000: nfstream 5.2.0 - Security Tool Files ≈ Packet Storm
    nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.
  • Fri, 17 Jul 2020 19:34:12 +0000: SMB12 Information Gathering - Security Tool Files ≈ Packet Storm
    SMB12 Information Gathering is a data gathering python script that inspects SMB1 and SMB2 endpoints. It will extract various attributes from the remote server such as OS version (only supported by SMB1 as per protocol definition), DNS computer name, DNS domain name, NetBIOS computer name and NetBIOS domain name (SMB1 and SMB2).
  • Fri, 17 Jul 2020 15:22:22 +0000: Sifter 8.5 - Security Tool Files ≈ Packet Storm
    Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.

@Risk Exploits

ExploitDB