This module exploits a vulnerability in the WireShark openSAFETY dissector, sending a specially crafted openSAFETY packet, causing WireShark to crash.
This module exploits a vulnerability in the WireShark LDAP dissector, sending a specially crafted LDAP packet, causing WireShark to crash.
This module exploits a vulnerability in the WireShark ENTTEC dissector by sending a specially crafted UDP packet.
The DRDA protocol dissector in Wireshark can enter an infinite loop when processing an specially crafted DRDA packet with the iLength field set to 0, causing Wireshark to stop responding.
This module exploits a vulnerability in the WireShark SNMP dissector, sending a specially crafted SNMP packet, causing WireShark to crash.
This module exploits a remote vulnerability that could allow an attacker to send a specially crafted IP message to an affected system causing a denial of service.
Some Windows kernel versions are susceptible to a remote denial-of-service vulnerability. This issue allows remote attackers to crash affected kernels, denying further network service to legitimate users.
The VMware vSphere API contains a denial of service vulnerability. This issue allows an unauthenticated user to send a maliciously crafted API request and disable the host daemon. Exploitation of the issue would prevent management activities on the host but any virtual machines running on the host would be unaffected. After the service crashes, a watchdog process automatically restarts it. However, after continuously attacking the server 2-3 times, it will not be restarted anymore.
This module shuts down the VicFTPS Server because it fails to properly handle user-supplied malformed packets using for login the Anonymous user provided by default for the program
The logging function used by the Ultr@VNC server is affected by a limited buffer-overflow caused by two calls to strcat() which add a Windows error message to the output buffer causing the server to crash and stop responding to further connections. Use this DoS in combination with the 'Ultr@VNC client side exploit' and an ARP spoofing to impersonate the real server on the network.
Pagination
- Previous page
- Page 5
- Next page