A parsing error when parsing the HTTP version causes a Squid cache process to terminate. This module sends HTTP requests that exploits this vulnerability. After repeating this several times the Squid cache stops and it doesn't restart.
This module sends HTTP requests with specially crafted data making the PHP process consume lot of resources. This attack prevents the victim server from processing requests from legitimate clients and probably will make the server non-operational. The PATH parameter must point to a PHP web page, which they normally have a ".php" extension.
This module exploits a buffer overflow vulnerability in OpenSSL by sending a crafted packet to port 10161, causing a denial of service effect.
This module exploits a vulnerability in OpenSSL by sending a crafted packet to port 4433, causing a denial of service effect.
This module exploits a vulnerability in ISC DHCP Server. The vulnerability is caused due to the improper handling of DHCP requests within dhcpd in the "cons_options()" function in options.c. This causes a stack-based buffer corruption by sending a specially crafted DHCP request specifying a maximum message size smaller than 278 bytes. This module, if successful, will leave the DHCP daemon unavailable.
This module exploits a vulnerability in the Linux kernel by sending a lot of "ICMPv6 Router Advertisement" messages to the target finalizing it in a Stop Responding target behavior.
A flaw was found in the Linux kernels IPv4 IGMP query processing. This module exploit this to cause a denial of service.
This module exploits an assertion failure vulnerability in BIND 9.8.0 servers to cause a denial of service. This vulnerability only affects BIND users who are using the Response Policy Zones (RPZ) feature configured for RRset replacement, i.e., returning a positive answer defined by the response policy.
This module exploits a vulnerability in BIND 9 when parsing dynamic update messages containing a record of type "ANY" and where at least one RRset for this FQDN exists on the server, causing the service to exit.
This module triggers a remote vulnerability that allows an attacker to send a NULL UDP message to an affected system, causing an infinit loop in the avahi-daemon service.
Pagination
- Previous page
- Page 47
- Next page