The VMware vSphere API contains a denial of service vulnerability. This issue allows an unauthenticated user to send a maliciously crafted API request and disable the host daemon. Exploitation of the issue would prevent management activities on the host but any virtual machines running on the host would be unaffected. After the service crashes, a watchdog process automatically restarts it. However, after continuously attacking the server 2-3 times, it will not be restarted anymore.
This module shuts down the VicFTPS Server because it fails to properly handle user-supplied malformed packets using for login the Anonymous user provided by default for the program
The logging function used by the Ultr@VNC server is affected by a limited buffer-overflow caused by two calls to strcat() which add a Windows error message to the output buffer causing the server to crash and stop responding to further connections. Use this DoS in combination with the 'Ultr@VNC client side exploit' and an ARP spoofing to impersonate the real server on the network.
This module shuts down the TYPSoft FTP Server because it fails to properly handle user-supplied malformed packets using for login the Anonymous user provided by default for the program
This module exploits a memory corruption vulnerability in the HTTP Server by sending a malformed packet to the 80/TCP port to crash the application.
Sends a shutdown command to the AJP12 Connector that will bring the whole Tomcat server down.
The vulnerability is caused due to an error in the processing of HTTP requests sent to the included web server.
This module exploits a vulnerability in Symantec AMS Intel Handler service by sending a malformed packet to the 38292/TCP port to crash the application.
Multiple vulnerabilities have been identified in Sun Java System Web Server, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system. These issues are caused by buffer overflow errors when processing malformed "TRACE" or "OPTIONS" requests, or overly long "Authorization: Digest" headers, which could be exploited by attackers to crash an affected server or execute arbitrary code. This exploit forces the server process to throw an unhandled exception and be restarted.
A parsing error when parsing the HTTP version causes a Squid cache process to terminate. This module sends HTTP requests that exploits this vulnerability. After repeating this several times the Squid cache stops and it doesn't restart.
Pagination
- Previous page
- Page 153
- Next page