Latest Exploits / Tools

Latest Exploits

  • Fri, 13 Aug 2021 14:32:03 +0000: PluXML 5.8.7 Cross Site Scripting - Exploit Files ≈ Packet Storm
    PluXML version 5.8.7 suffers from a persistent cross site scripting vulnerability.
  • Fri, 13 Aug 2021 14:27:23 +0000: HackTool.Win32.HKit Remote Command Execution - Exploit Files ≈ Packet Storm
    HackTool.Win32.HKit malware suffers from a remote command execution vulnerability.
  • Fri, 13 Aug 2021 14:26:40 +0000: Simple Image Gallery System 1.0 SQL Injection - Exploit Files ≈ Packet Storm
    Simple Image Gallery System version 1.0 suffers from a remote SQL injection vulnerability.
  • Fri, 13 Aug 2021 14:25:06 +0000: 4images 1.8 SQL Injection - Exploit Files ≈ Packet Storm
    4images version 1.8 suffers from a remote SQL injection vulnerability.
  • Fri, 13 Aug 2021 14:23:14 +0000: Care2x Open Source Hospital Information Management 2.7 Alpha XSS - Exploit Files ≈ Packet Storm
    Care2x Open Source Hospital Information Management version 2.7 Alpha suffers from multiple persistent cross site scripting vulnerabilities.
  • Fri, 13 Aug 2021 14:21:42 +0000: Chikitsa 2.0.0 Cross Site Scripting - Exploit Files ≈ Packet Storm
    Chikitsa version 2.0.0 suffers from a cross site scripting vulnerability.
  • Fri, 13 Aug 2021 14:19:27 +0000: Easy-Mock 1.6.0 Remote Code Execution - Exploit Files ≈ Packet Storm
    Easy-Mock version 1.6.0 authenticated remote code execution exploit.
  • Fri, 13 Aug 2021 14:12:13 +0000: Police Crime Record Management System 1.0 Cross Site Scripting - Exploit Files ≈ Packet Storm
    Police Crime Record Management System version 1.0 suffers from a persistent cross site scripting vulnerability.
  • Fri, 13 Aug 2021 14:11:15 +0000: Police Crime Record Management System 1.0 SQL Injection - Exploit Files ≈ Packet Storm
    Police Crime Record Management System version 1.0 suffers from a remote SQL injection vulnerability.
  • Fri, 13 Aug 2021 10:11:11 +0000: RATES SYSTEM 1.0 SQL Injection - Exploit Files ≈ Packet Storm
    RATES SYSTEM version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass. Original discovery of SQL injection in this version is attributed to Halit Akaydin in August of 2021.
  • Thu, 12 Aug 2021 15:53:09 +0000: Lexmark Driver Privilege Escalation - Exploit Files ≈ Packet Storm
    Various Lexmark Universal Printer drivers as listed at advisory TE953 allow low-privileged authenticated users to elevate their privileges to SYSTEM on affected Windows systems by modifying the XML file at C:\ProgramData\\Universal Color Laser.gdl to replace the DLL path to unires.dll with a malicious DLL path. When C:\Windows\System32\Printing_Admin_Scripts\en-US\prnmngr.vbs is then used to add the printer to the affected system, PrintIsolationHost.exe, a Windows process running as NT AUTHORITY\SYSTEM, will inspect the C:\ProgramData\\Universal Color Laser.gdl file and will load the malicious DLL from the path specified in the file. This which will result in the malicious DLL executing as NT AUTHORITY\SYSTEM. Once this module is finished, it will use the prnmngr.vbs script to remove the printer it added.
  • Thu, 12 Aug 2021 15:49:57 +0000: Atlassian Crowd pdkinstall Remote Code Execution - Exploit Files ≈ Packet Storm
    This Metasploit module can be used to upload a plugin on Atlassian Cloud via the pdkinstall development plugin as an unauthenticated attacker. The payload is uploaded as a JAR archive containing a servlet using a POST request to /crowd/admin/uploadplugin.action. The check command will check that the /crowd/admin/uploadplugin.action page exists and that it responds appropriately to determine if the target is vulnerable or not.
  • Thu, 12 Aug 2021 15:43:58 +0000: RATES SYSTEM 1.0 SQL Injection - Exploit Files ≈ Packet Storm
    RATES SYSTEM version 1.0 suffers from a remote SQL injection vulnerability.
  • Thu, 12 Aug 2021 15:39:53 +0000: COVID19 Testing Management System 1.0 SQL Injection - Exploit Files ≈ Packet Storm
    COVID19 Testing Management System version 1.0 suffers from a remote SQL injection vulnerability leveraging the searchdata parameter on the patient-search-report.php page. This is a variant of the original discovery of SQL injection in this version as discovered by Rohit Burke in May of 2021.
  • Thu, 12 Aug 2021 15:36:42 +0000: Xiaomi 10.2.4.g Information Disclosure - Exploit Files ≈ Packet Storm
    Xiaomi browser version 10.2.4.g suffers from a browser search history disclosure vulnerability.
  • Wed, 11 Aug 2021 16:22:43 +0000: Canon TR150 Driver 3.71.2.10 Privilege Escalation - Exploit Files ≈ Packet Storm
    Canon TR150 print drivers versions 3.71.2.10 and below allow local users to read/write files within the "CanonBJ" directory and its subdirectories. By overwriting the DLL at C:\ProgramData\CanonBJ\IJPrinter\CNMWINDOWS\Canon TR150 series\LanguageModules\040C\CNMurGE.dll with a malicious DLL at the right time whilst running the C:\Windows\System32\Printing_Admin_Scripts\en-US\prnmngr.vbs script to install a new printer, a timing issue can be exploited to cause the PrintIsolationHost.exe program, which runs as NT AUTHORITY\SYSTEM, to successfully load the malicious DLL. Successful exploitation will grant attackers code execution as the NT AUTHORITY\SYSTEM user. This Metasploit module leverages the prnmngr.vbs script to add and delete printers. Multiple runs of this module may be required given successful exploitation is time-sensitive.
  • Wed, 11 Aug 2021 16:19:41 +0000: HackTool.Win32.Hidd.b Buffer Overflow - Exploit Files ≈ Packet Storm
    HackTool.Win32.Hidd.b malware suffers from a buffer overflow vulnerability.
  • Wed, 11 Aug 2021 16:18:27 +0000: Backdoor.Win32.IRCBot.gen Hardcoded Credential - Exploit Files ≈ Packet Storm
    Backdoor.Win32.IRCBot.gen malware suffers from a hardcoded credential vulnerability.
  • Wed, 11 Aug 2021 16:14:49 +0000: Trojan-Proxy.Win32.Raznew.gen Unauthenticated Open Proxy - Exploit Files ≈ Packet Storm
    Trojan-Proxy.Win32.Raznew.gen malware suffers from an unauthenticated open proxy vulnerability.
  • Tue, 10 Aug 2021 15:10:20 +0000: MobileTogether Server 7.3 XML Injection - Exploit Files ≈ Packet Storm
    RedTeam Pentesting discovered a vulnerability in the MobileTogether server which allows users with access to at least one application to read arbitrary, non-binary files from the file system and perform server-side requests. The vulnerability can also be used to deny availability of the system. As an example, this advisory shows the compromise of the server's certificate and private key. Versions 7.0 through 7.3 are affected.

Latest Tools

  • Wed, 11 Aug 2021 16:21:15 +0000: Faraday 3.17.0 - Security Tool Files ≈ Packet Storm
    Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.
  • Mon, 09 Aug 2021 14:17:10 +0000: Nmap Port Scanner 7.92 - Security Tool Files ≈ Packet Storm
    Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.
  • Mon, 02 Aug 2021 14:19:40 +0000: SQLMAP - Automatic SQL Injection Tool 1.5.8 - Security Tool Files ≈ Packet Storm
    sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.
  • Fri, 23 Jul 2021 19:04:01 +0000: Logwatch 7.5.6 - Security Tool Files ≈ Packet Storm
    Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.
  • Thu, 22 Jul 2021 16:10:11 +0000: Lynis Auditing Tool 3.0.6 - Security Tool Files ≈ Packet Storm
    Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
  • Mon, 19 Jul 2021 15:43:33 +0000: American Fuzzy Lop plus plus 3.14c - Security Tool Files ≈ Packet Storm
    Google's American Fuzzy Lop is a brute-force fuzzer coupled with an exceedingly simple but rock-solid instrumentation-guided genetic algorithm. afl++ is a superior fork to Google's afl. It has more speed, more and better mutations, more and better instrumentation, custom module support, etc.
  • Mon, 19 Jul 2021 15:42:59 +0000: Hashcat Advanced Password Recovery 6.2.3 Source Code - Security Tool Files ≈ Packet Storm
    Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.
  • Mon, 19 Jul 2021 15:42:51 +0000: Hashcat Advanced Password Recovery 6.2.3 Binary Release - Security Tool Files ≈ Packet Storm
    Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.
  • Thu, 15 Jul 2021 13:54:39 +0000: Wireshark Analyzer 3.4.7 - Security Tool Files ≈ Packet Storm
    Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.
  • Wed, 14 Jul 2021 13:02:22 +0000: UFONet 1.7 - Security Tool Files ≈ Packet Storm
    UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multi-threading, proxies, origin spoofing methods, cache evasion techniques, etc.
  • Tue, 13 Jul 2021 15:21:14 +0000: Global Socket 1.4.33 - Security Tool Files ≈ Packet Storm
    Global Socket is a tool for moving data from here to there, securely, fast, and through NAT and firewalls. It uses the Global Socket Relay Network to connect TCP pipes, has end-to-end encryption (using OpenSSL's SRP / RFC-5054), AES-256 and key exchange using 4096-bit Prime, requires no PKI, has Perfect Forward Secrecy, and TOR support.
  • Wed, 07 Jul 2021 16:13:17 +0000: Zeek 4.0.3 - Security Tool Files ≈ Packet Storm
    Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.
  • Mon, 05 Jul 2021 16:43:37 +0000: Stegano 0.9.9 - Security Tool Files ≈ Packet Storm
    Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.
  • Mon, 05 Jul 2021 16:41:13 +0000: SQLMAP - Automatic SQL Injection Tool 1.5.7 - Security Tool Files ≈ Packet Storm
    sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.
  • Mon, 05 Jul 2021 16:36:35 +0000: Faraday 3.16.1 - Security Tool Files ≈ Packet Storm
    Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.
  • Mon, 05 Jul 2021 16:30:08 +0000: GNU Privacy Guard 2.2.29 - Security Tool Files ≈ Packet Storm
    GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions. This is the LTS release.
  • Fri, 02 Jul 2021 16:33:36 +0000: Suricata IDPE 6.0.3 - Security Tool Files ≈ Packet Storm
    Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
  • Fri, 02 Jul 2021 16:27:09 +0000: nfstream 6.3.3 - Security Tool Files ≈ Packet Storm
    nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline network data both easy and intuitive. It aims to be the fundamental high-level building block for doing practical, real world network data analysis in Python. Additionally, it has the broader goal of becoming a common network data processing framework for researchers providing data reproducibility across experiments.
  • Fri, 02 Jul 2021 16:24:34 +0000: Lynis Auditing Tool 3.0.5 - Security Tool Files ≈ Packet Storm
    Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
  • Thu, 01 Jul 2021 16:52:51 +0000: TOR Virtual Network Tunneling Tool 0.4.6.6 - Security Tool Files ≈ Packet Storm
    Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). This is the source code release.

@Risk Exploits

ExploitDB

 

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Contact Us