This module exploits a code execution vulnerability in the Veritas Web Server service by sending a specially crafted authentication request to the 14300/TCP port.
The vulnerability found in Wonderware SuiteLink Service (slssvc.exe) could allow an un-authenticated remote attacker with the ability to connect to the SuiteLink service TCP port to shutdown the service abnormally by sending a malformed packet.
This module exploits a vulnerability in the WireShark openSAFETY dissector, sending a specially crafted openSAFETY packet, causing WireShark to crash.
This module exploits a vulnerability in the WireShark LDAP dissector, sending a specially crafted LDAP packet, causing WireShark to crash.
This module exploits a vulnerability in the WireShark ENTTEC dissector by sending a specially crafted UDP packet.
The DRDA protocol dissector in Wireshark can enter an infinite loop when processing an specially crafted DRDA packet with the iLength field set to 0, causing Wireshark to stop responding.
This module exploits a vulnerability in the WireShark SNMP dissector, sending a specially crafted SNMP packet, causing WireShark to crash.
This module exploits a remote vulnerability that could allow an attacker to send a specially crafted IP message to an affected system causing a denial of service.
Some Windows kernel versions are susceptible to a remote denial-of-service vulnerability. This issue allows remote attackers to crash affected kernels, denying further network service to legitimate users.
The VMware vSphere API contains a denial of service vulnerability. This issue allows an unauthenticated user to send a maliciously crafted API request and disable the host daemon. Exploitation of the issue would prevent management activities on the host but any virtual machines running on the host would be unaffected. After the service crashes, a watchdog process automatically restarts it. However, after continuously attacking the server 2-3 times, it will not be restarted anymore.
Pagination
- Previous page
- Page 74
- Next page