Multiple vulnerabilities have been identified in Sun Java System Web Server, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system. These issues are caused by buffer overflow errors when processing malformed "TRACE" or "OPTIONS" requests, or overly long "Authorization: Digest" headers, which could be exploited by attackers to crash an affected server or execute arbitrary code. This exploit forces the server process to throw an unhandled exception and be restarted.
This module shuts down the Solar FTP Server(sfsservice.exe)because it fails to properly handle user-supplied commands.
This module shuts down the Solarwinds TFTP server.
By sending a specially crafted SMB packet, this exploit performs a Denial of Service attack on the target machine. The attack will trigger a operating system halt (Blue Screen).
By sending a specially crafted SMB packet, this exploit performs a Denial of Service attack on the target machine. The attack will trigger an operating system halt (Blue Screen).
The Serva32 TFTPD service is vulnerable to a buffer overflow vulnerability when parsing large read requests. When the application reads in a large buffer the application crashes
This module exploits a memory corruption vulnerability in the Serva32 HTTP Server by sending a malformed packet to the 80/TCP port to crash the application.
This module shuts down the Quick n Easy FTP Server because it fails to properly handle user-supplied malformed packets.
A buffer overflow vulnerability exists in Microsoft's PPTP (Point to Point Tunnelling Protocol) implementation. Both the PPTP server and client applications are vulnerable. It is possible to crash the kernel of the target (blue screen), the installation of an agent using this vulnerability is difficult and have not been implemented in this module.
This module sends HTTP requests with specially crafted data making the PHP process consume lot of resources. This attack prevents the victim server from processing requests from legitimate clients and probably will make the server non-operational. The PATH parameter must point to a PHP web page, which they normally have a ".php" extension.
Pagination
- Previous page
- Page 110
- Next page