Home Tools Page 363

Tools

The latest hacking and hacker tools. Open source offensive and defensive security tools. Browse interactive maps of offensive security tools used by malicious actors and cybercriminals. Check out some live threat maps and malware intelligence databases.

This will be a curated list of mostly open source hacking tools. These can range from Red Teaming offensive security tools to fuzzers and debuggers for malware analysis. We are always looking for new state of the art tools that can be used for security professionals. Please feel free to send us a tool via email or one of our social media accounts.

Trojan.Win32.SkynetRef.x Unauthenticated Open Proxy

0
Authored by malvuln | Site malvuln.com Trojan.Win32.SkynetRef.x malware suffers from an unauthenticated open proxy vulnerability. Change Mirror Download Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/339ec4617eababfd46006f2219e68cb8.txtContact: [email protected]: twitter.com/malvulnThreat: Trojan.Win32.SkynetRef.xVulnerability: Unauthenticated...

Backdoor.Win32.Hupigon.nqr Unauthenticated Open Proxy

0
Authored by malvuln | Site malvuln.com Backdoor.Win32.Hupigon.nqr malware suffers from an unauthenticated open proxy vulnerability. Change Mirror Download Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/9603420a004d9559e610ddeb9d94e20a.txtContact: [email protected]: twitter.com/malvulnThreat: Backdoor.Win32.Hupigon.nqrVulnerability: Unauthenticated...

zlog 1.2.15 Buffer Overflow

0
Authored by LIWEI zlog version 1.2.15 suffers from a buffer overflow vulnerability. Change Mirror Download # Exploit Title: zlog 1.2.15 - Buffer Overflow# Date: 10/23/2021# Exploit Author: LIWEI# Vendor Homepage: https://github.com/HardySimpson/zlog#...

Pentaho Business Analytics / Pentaho Business Server 9.1 Insufficient Access Control

0
Authored by Altion Malka, Alberto Favero Pentaho implements a series of web services using the SOAP protocol to allow scripting interaction with the backend server. While most of the interfaces...

ImportExportTools NG 10.0.4 HTML Injection

0
Authored by Vulnerability Laboratory | Site vulnerability-lab.com ImportExportTools NG version 10.0.4 suffers from an html injection vulnerability. Change Mirror Download Document Title:===============ImportExportTools NG 10.0.4 - HTML Injection VulnerabilityReferences (Source):====================https://www.vulnerability-lab.com/get_content.php?id=2308Release Date:=============2021-11-05Vulnerability Laboratory ID...

Backdoor.Win32.Ncx.b Code Execution

0
Authored by malvuln | Site malvuln.com Backdoor.Win32.Ncx.b malware suffers from a code execution vulnerability. Change Mirror Download Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/885e74a43b4f7caec3cfb4dba0787de4_B.txtContact: [email protected]: twitter.com/malvulnThreat: Backdoor.Win32.Ncx.bVulnerability: Unauthenticated Remote...

IBM Sterling B2B Integrator Cross Site Scripting

0
Authored by T. Silpavarangkura, Sutthiwat Panithansuwan | Site sec-consult.com IBM Sterling B2B Integrator suffers from a cross site scripting vulnerability. Versions affected include 5.2.0.0 through 5.2.6.5_3, 6.0.0.0 through 6.0.3.4, and...

PHP Event Calendar Lite Edition Cross Site Scripting

0
Authored by Erik Steltzner, Maurizio Ruchay | Site sec-consult.com PHP Event Calendar Lite Edition suffers from a persistent cross site scripting vulnerability. advisories | CVE-2021-42078 Change Mirror Download Advisory ID: ...

Pentaho Business Analytics / Pentaho Business Server 9.1 Authentication Bypass

0
Authored by Altion Malka, Alberto Favero Pentaho Business Analytics and Pentaho Business Server versions 9.1 and below suffer from an authentication bypass vulnerability related to Spring APIs. advisories | CVE-2021-31602 Change Mirror...

Pentaho Business Analytics / Pentaho Business Server 9.1 User Enumeration

0
Authored by Altion Malka, Alberto Favero Pentaho implements a series of web services using the SOAP protocol to allow scripting interaction with the backend server. HAWSEC identified that the services...