The DRDA protocol dissector in Wireshark can enter an infinite loop when processing an specially crafted DRDA packet with the iLength field set to 0, causing Wireshark to stop responding.
This module exploits a remote vulnerability that could allow an attacker to send a specially crafted IP message to an affected system causing a denial of service.
The VMware vSphere API contains a denial of service vulnerability. This issue allows an unauthenticated user to send a maliciously crafted API request and disable the host daemon. Exploitation of the issue would prevent management activities on the host but any virtual machines running on the host would be unaffected. After the service crashes, a watchdog process automatically restarts it. However, after continuously attacking the server 2-3 times, it will not be restarted anymore.
The logging function used by the Ultr@VNC server is affected by a limited buffer-overflow caused by two calls to strcat() which add a Windows error message to the output buffer causing the server to crash and stop responding to further connections. Use this DoS in combination with the 'Ultr@VNC client side exploit' and an ARP spoofing to impersonate the real server on the network.