This module sends HTTP requests with specially crafted data making the PHP process consume lot of resources. This attack prevents the victim server from processing requests from legitimate clients and probably will make the server non-operational. The PATH parameter must point to a PHP web page, which they normally have a ".php" extension.
This module exploits a vulnerability in ISC DHCP Server. The vulnerability is caused due to the improper handling of DHCP requests within dhcpd in the "cons_options()" function in options.c. This causes a stack-based buffer corruption by sending a specially crafted DHCP request specifying a maximum message size smaller than 278 bytes. This module, if successful, will leave the DHCP daemon unavailable.
This module exploits an assertion failure vulnerability in BIND 9.8.0 servers to cause a denial of service. This vulnerability only affects BIND users who are using the Response Policy Zones (RPZ) feature configured for RRset replacement, i.e., returning a positive answer defined by the response policy.
This module exploits a vulnerability in BIND 9 when parsing dynamic update messages containing a record of type "ANY" and where at least one RRset for this FQDN exists on the server, causing the service to exit.
This module triggers a remote vulnerability that allows an attacker to send a NULL UDP message to an affected system, causing an infinit loop in the avahi-daemon service.