NetBIOS NBSTAT name query reflection denial of service proof of concept exploit.
Monthly Archives: July 2015
You Need To Speak Up For Internet Security. Right Now. If You Don't, Packet Storm Will Most Likely Cease To Exist.
Tor-ramdisk i686 UClibc-based Linux Distribution x86 20150714
Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.
D-Link Cookie Command Execution
This Metasploit module exploits an anonymous remote upload and code execution vulnerability on different D-Link devices. The vulnerability is a command injection in the cookie handling process of the lighttpd web server when handling specially crafted cookie values. This Metasploit module has been successfully tested on D-Link DSP-W110A1_FW105B01 in emulated environment.
Oracle Application Express Cross Site Scripting
The gReport Controls Sort Widget in Oracle Application Express is prone to permanent cross site scripting. The setting “display as” of the column attributes is ignored for the filter list. Versions prior to 4.2.3.00.08 are affected.
Elasticsearch Directory Traversal
Elasticsearch versions from 1.0.0 to 1.6.0 are vulnerable to a directory traversal attack that allows an attacker to retrieve files that are readable by the Elasticsearch JVM process.
Elasticsearch Remote Code Execution
Elasticsearch versions prior to 1.6.1 are vulnerable to an engineered attack on its transport protocol that enables remote code execution.
glibc / tcmalloc / jemalloc Double Destructor/Free
Three proof of concept exploits demonstrating double-free issues with glibc, tcmalloc, and jemalloc.
EMC Documentum CenterStage Cross Site Scripting
EMC Documentum CenterStage is affected by a stored cross-site scripting vulnerability that could potentially be exploited by an attacker by injecting malicious HTML or script. This may lead to execution of injected HTML or script in the context of the authenticated user.
EMC Documentum WebTop Open Redirect
EMC Documentum WebTop and WebTop based client products contain an open redirected vulnerability. Attackers could potentially exploit this vulnerability by supplying crafted URLs to users of the affected application and causing a browser redirect to arbitrary and potentially malicious websites.