Hack Tools/Exploits

Packetstorm Last 10 Files

  1. I2P 0.9.14 - I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
  2. OpenDNSSEC 1.4.6 - OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.
  3. TOR Virtual Network Tunneling Tool 0.2.4.23 - Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
  4. SAP Netweaver Business Warehouse Missing Authorization - Onapsis Security Advisory - SAP BW-SYS-DB-DB4 component contains a remote-enabled RFC function that does not perform authorization checks prior to retrieving sensitive information.
  5. SAP HANA XS Administration Tool Cross Site Scripting - Onapsis Security Advisory - The SAP HANA XS Administration Tool can be abused by potential attackers, allowing them to modify displayed application content without authorization, and to potentially obtain authentication information from other legitimate users.
  6. SAP FI Manager Self-Service Hardcoded Username - Onapsis Security Advisory - SAP FI Manager Self-Service contains a hardcoded username which could allow a user to access functions or information that should be restricted.
  7. SAP_JTECHS HTTP Verb Tampering - Onapsis Security Advisory - SAP_JTECHS suffers from an HTTP verb tampering vulnerability. By exploiting this vulnerability, a remote unauthenticated attacker would be able to access restricted functionality and information. SAP Solution Manager 7.1 is affected.
  8. SAP HANA IU5 SDK Authentication Bypass - Onapsis Security Advisory - SAP HANA IU5 SDK Application does not enforce any authentication when it is explicitly configured. It could allow an anonymous user to access functions or information that should be restricted.
  9. SAP HANA XS Missing Encryption - Onapsis Security Advisory - SAP HANA XS does not enforce any encryption in the form based authentication. It could allow an anonymous user to get information such as valid credentials from network traffic, gaining access into the system.
  10. Barracuda WAF 6.1.5 / LoadBalancer 4.2.2 Filter Bypass / XSS - Barracuda Networks Web Application Firewall version 6.1.5 and LoadBalancer version 4.2.2 suffer from filter bypass and cross site scripting vulnerabilities.

Packetstorm Tools

  1. I2P 0.9.14 - I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
  2. OpenDNSSEC 1.4.6 - OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.
  3. TOR Virtual Network Tunneling Tool 0.2.4.23 - Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
  4. DEScrypt Ztex Bruteforcer - Proof of concept project that demonstrates how old FPGA boards can be reused for hash cracking purposes.
  5. Redis Portscan Utility - This python script port scans a host using a redis server.
  6. iTunes Manifest.mbdb Parser - This python script parses the Manifest.mbdb binary database file from iTunes Backup and prints CSV output.
  7. Lynis Auditing Tool 1.5.8 - Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
  8. SILC (Secure Internet Live Conferencing) Client 1.1.11 - SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all client related files.
  9. Otori 0.3 - This is a Metasploit-style module system specifically for XXE exploit code. This allows a common interface, including the ability to automate downloads of numerous files, or automatically walk the directory structure if the vulnerable system is based on Java.
  10. pyClamd 0.3.10 - pyClamd is a python interface to Clamd (Clamav daemon). By using pyClamd, you can add virus detection capabilities to your python software in an efficient and easy way. Instead of pyClamav which uses libclamav, pyClamd may be used by a closed source product.

Packetstorm Exploits

  1. Barracuda WAF 6.1.5 / LoadBalancer 4.2.2 Filter Bypass / XSS - Barracuda Networks Web Application Firewall version 6.1.5 and LoadBalancer version 4.2.2 suffer from filter bypass and cross site scripting vulnerabilities.
  2. WiFi HD 7.3.0 LFI / Traversal / Command Injection / CSRF - WiFi HD version 7.3.0 suffers from local file inclusion, directory traversal, command injection, and cross site request forgery vulnerabilities.
  3. Lyris ListManagerWeb 8.95a Cross Site Scripting - Lyris ListManagerWeb version 8.95a suffers from a cross site scripting vulnerability.
  4. LinkedIn Cross Site Request Forgery - LinkedIn suffered from a cross site request forgery vulnerability.
  5. WordPress WhyDoWork AdSense 1.2 XSS / CSRF - WordPress WhyDoWork AdSense plugin version 1.2 suffers from cross site request forgery and cross site scripting vulnerabilities.
  6. J&W Communications SQL Injection - Sites created by J&W Communications appear to suffer from remote SQL injection vulnerabilities. Note that this finding houses site-specific data.
  7. Oxwall 1.7.0 Remote Code Execution - Oxwall suffers from an authenticated arbitrary PHP code execution. The vulnerability is caused due to the improper verification of uploaded files in '/admin/settings/user' script thru the 'avatar' and 'bigAvatar' POST parameters. This can be exploited to execute arbitrary PHP code by uploading a malicious PHP script file with '.php5' extension (to bypass the '.htaccess' block rule) that will be stored in '/ow_userfiles/plugins/base/avatars/' directory. Version 1.7.0 (builds 7907 and 7906) are affected.
  8. Oxwall 1.7.0 Cross Site Request Forgery / Cross Site Scripting - Oxwall version 1.7.0 (builds 7907 and 7906) suffer from cross site request forgery and cross site scripting vulnerabilities.
  9. ZeroCMS 1.0 Cross Site Scripting - ZeroCMS version 1.0 suffers from a persistent cross site scripting vulnerability.
  10. DirPHP 1.0 Local File Inclusion - DirPHP version 1.0 suffers from a local file inclusion vulnerability.

Securiteam Exploits

  1. Cisco Intrusion Prevention System (IPS) Malformed Packet Handling Control-Plane Access List MainApp Process Remote DoS Vulnerability - Cisco intrusion prevention system (IPS) malformed packet handling control-plane access list mainApp process remote suffers from denial of service vulnerability
  2. Cisco Unified Contact Center Express (CCX) CCMConfig Page Remote Information Disclosure Vulnerability - Cisco intrusion prevention system (IPS) malformed SNMP packet handling mainapp process remote suffers from denial of service vulnerability
  3. Drupal Core Information Disclosure Vulnerability - Drupal 6.x before 6.31 and 7.x before 7.27 does not properly isolate the cached data of different anonymous users, which allows remote anonymous users to obtain sensitive interim form input information in opportunistic situations via unspecified vectors.
  4. FileField Module For Drupal Revision File Attachment Permission Verification Private File Disclosure Vulnerability - Filefield module for drupal revision file attachment permission verification suffers from private file disclosures vulnerability
  5. Google Chrome Type Confusion Based Denial Of Service Vulnerability - Google Chrome 34.0.187.13x suffers from confusion based denial of service vulnerability