The logging function used by the Ultr@VNC server is affected by a limited buffer-overflow caused by two calls to strcat() which add a Windows error message to the output buffer causing the server to crash and stop responding to further connections. Use this DoS in combination with the 'Ultr@VNC client side exploit' and an ARP spoofing to impersonate the real server on the network.
This module shuts down the TYPSoft FTP Server because it fails to properly handle user-supplied malformed packets using for login the Anonymous user provided by default for the program
Multiple vulnerabilities have been identified in Sun Java System Web Server, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system. These issues are caused by buffer overflow errors when processing malformed "TRACE" or "OPTIONS" requests, or overly long "Authorization: Digest" headers, which could be exploited by attackers to crash an affected server or execute arbitrary code. This exploit forces the server process to throw an unhandled exception and be restarted.