Hack Tools/Exploits

Packetstorm Last 10 Files

  1. Ubuntu Security Notice USN-2617-3 - Ubuntu Security Notice 2617-3 - USN-2617-1 fixed a vulnerability in NTFS-3G. The original patch did not completely address the issue. This update fixes the problem. Tavis Ormandy discovered that FUSE incorrectly filtered environment variables. A local attacker could use this issue to gain administrative privileges. Various other issues were also addressed.
  2. Red Hat Security Advisory 2015-1030-01 - Red Hat Security Advisory 2015-1030-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A use-after-free flaw was found in the way the Linux kernel's SCTP implementation handled authentication key reference counting during INIT collisions. A remote attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system. This issue was discovered by Sun Baoliang of Red Hat.
  3. Red Hat Security Advisory 2015-1031-01 - Red Hat Security Advisory 2015-1031-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU's virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host's QEMU process corresponding to the guest.
  4. Debian Security Advisory 3268-2 - Debian Linux Security Advisory 3268-2 - The patch applied for ntfs-3g to fix CVE-2015-3202 in DSA 3268-1 was incomplete. This update corrects that problem.
  5. SAP HANA Log Injection - Onapsis Security Advisory - Under certain conditions, the SAP HANA XS engine is vulnerable to arbitrary log injection, allowing remote authenticated attackers to write arbitrary information in log files. This could be used to corrupt log files or add fake content misleading an administrator.
  6. SAP HANA Information Disclosure - Onapsis Security Advisory - SAP HANA suffers from an information disclosure vulnerability via SQL IMPORT FROM statements.
  7. hwclock Privilege Escalation - hwclock on Linux, when setuid, allows for local root-level privilege escalation.
  8. WordPress Free Counter 1.1 Cross Site Scripting - WordPress Free Counter plugin version 1.1 suffers from a cross site scripting vulnerability.
  9. DbNinja Flash 3.2.6 Cross Site Scripting - DbNinja Flash version 3.2.6 suffers from multiple cross site scripting vulnerabilities.
  10. SOPHOS WAF JSON Filter Bypass - SOPHOS WAF fails to mitigate SQL injection attacks leveraged via JSON.

Packetstorm Tools

  1. Packet Fence 5.1.0 - PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
  2. OATH Toolkit 2.6.0 - OATH Toolkit attempts to collect several tools that are useful when deploying technologies related to OATH, such as HOTP one-time passwords. It is a fork of the earlier HOTP Toolkit.
  3. INURLBR Search Scanner 2.1.0 - INURL is a php tool written to make searching across multiple engines easier when researching web site targets.
  4. UFONet 0.5b - UFONet is a tool designed to launch DDoS attacks against a target, using open redirection vectors on third party web applications.
  5. AIEngine 1.2 - AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.
  6. TOR Virtual Network Tunneling Tool 0.2.6.8 - Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
  7. HostBox SSH 0.3 - HostBox SSH is a python script will scan servers and routers for insecure SSH configurations.
  8. FTP-Map 0.5 - Ftpmap scans remote FTP servers to identify what software and what versions they are running. It uses program-specific fingerprints to discover the name of the software even when banners have been changed or removed, or when some features have been disabled. also FTP-Map can detect vulnerable servers by the FTP software/version.
  9. Wireshark Analyzer 1.12.5 - Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.
  10. Netsniff-NG High Performance Sniffer 0.5.9 - netsniff-ng is is a free, performant Linux network sniffer for packet inspection. The gain of performance is reached by 'zero-copy' mechanisms, so that the kernel does not need to copy packets from kernelspace to userspace. For this purpose netsniff-ng is libpcap independent, but nevertheless supports the pcap file format for capturing, replaying and performing offline-analysis of pcap dumps. netsniff-ng can be used for protocol analysis, reverse engineering and network debugging.

Packetstorm Exploits

  1. hwclock Privilege Escalation - hwclock on Linux, when setuid, allows for local root-level privilege escalation.
  2. WordPress Free Counter 1.1 Cross Site Scripting - WordPress Free Counter plugin version 1.1 suffers from a cross site scripting vulnerability.
  3. DbNinja Flash 3.2.6 Cross Site Scripting - DbNinja Flash version 3.2.6 suffers from multiple cross site scripting vulnerabilities.
  4. SOPHOS WAF JSON Filter Bypass - SOPHOS WAF fails to mitigate SQL injection attacks leveraged via JSON.
  5. WordPress WP Fast Cache 1.4 CSRF / Cross Site Scripting - WordPress WP Fast Cache plugin version 1.4 suffers from cross site request forgery and cross site scripting vulnerabilities.
  6. Aruba ClearPass Policy Manager 6.4 Cross Site Scripting - Aruba ClearPass Policy Manager version 6.4 suffers from a stored cross site scripting vulnerability.
  7. extjs Arbitrary File Read - extjs suffers from an arbitrary file read vulnerability.
  8. Synology Photo Station 6.2-2858 Cross Site Scripting - Synology Photo Station version 6.2-2858 suffers from multiple cross site scripting vulnerabilities.
  9. Synology DiskStation Manager 5.2-5565 Cross Site Scripting - Synology DiskStation Manager version 5.2-5565 suffers from a cross site scripting vulnerability.
  10. Synology Photo Station 6.2-2858 Command Injection - Synology Photo Station version 6.2-2858 suffers from a command injection vulnerability.

Securiteam Exploits

  1. Docker Local Privilege Escalation Remote Code Vulnerabilities - Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying security options to an image.
  2. Facebook Like Box Plugin For WordPress Multiple Cross-Site Request Forgery Vulnerabilities - Multiple cross-site request forgery (CSRF) vulnerabilities in the Facebook Like Box (cardoza-facebook-like-box) plugin before 2.8.3 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) change plugin settings via unspecified vectors or conduct cross-site scripting (XSS) attacks via the (2) frm_title, (3) frm_url, (4) frm_border_color, (5) frm_width, or (6) frm_height parameter in the slug_for_fb_like_box page to wp-admin/admin.php.
  3. Gogago YouTube Video Converter ActiveX Control Buffer Overflow Vulnerabilities - Buffer overflow in the Download method in a certain ActiveX control in MDIEEx.dll in Gogago YouTube Video Converter 1.1.6 allows remote attackers to execute arbitrary code via a long argument.
  4. IBM Master Data Management Collaboration Server Cross-Site Scrpting Vulnerabilities - Cross-site scripting (XSS) vulnerability in the Collaboration Server in IBM InfoSphere Master Data Management Server for Product Information Management 9.x through 9.1 and InfoSphere Master Data Management - Collaborative Edition 10.x through 10.1, 11.0 before FP7, and 11.3 and 11.4 before 11.4 FP1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
  5. IBM WebSphere DataPower XC10 Information Disclosure Vulnerabilities - The IBM WebSphere DataPower XC10 appliance 2.1 and 2.5 before FP4 allows local users to obtain sensitive information by reading a response.