header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

minaliC 2.0.0 – Denial of Service (DoS)

The exploit targets minaliC 2.0.0 on Windows XP Professional Service Pack 2 and 3 (English). By sending a large amount of data via the GET method to the web server, the server crashes upon receiving and processing the request, leading to denial of service. Successful exploitation of this vulnerability allows remote attackers to disrupt the server, affecting legitimate users.

VIMESA VHF/FM Transmitter Blue Plus 9.7.1 (doreboot) Remote Denial Of Service

An unauthenticated attacker can exploit a Denial of Service vulnerability in VIMESA VHF/FM Transmitter Blue Plus 9.7.1 by sending an unauthorized HTTP GET request to the unprotected endpoint 'doreboot', resulting in the restart of transmitter operations.

Electrolink FM/DAB/TV Transmitter Unauthenticated Remote DoS

An unauthenticated attacker can exploit Electrolink FM/DAB/TV Transmitter systems, affecting versions ranging from 10W to 30kW, leading to a remote Denial of Service (DoS) condition. By sending specially crafted requests, the attacker can disrupt the normal operation of the transmitters, potentially causing service interruptions or downtime.

VIMESA VHF/FM Transmitter Blue Plus 9.7.1 (doreboot) Remote Denial Of Service

The VIMESA VHF/FM Transmitter Blue Plus 9.7.1 is vulnerable to a Denial of Service (DoS) attack. By sending an unauthorized HTTP GET request to the unprotected endpoint 'doreboot', an unauthenticated attacker can restart the transmitter operations, causing a denial of service.

Electrolink FM/DAB/TV Transmitter Unauthenticated Remote DoS

Electrolink FM/DAB/TV Transmitters with web version 01.09, 01.08, and 01.07, display version 1.4 and 1.2, and control unit version 01.06, 01.04, and 01.03 are vulnerable to an unauthenticated remote Denial of Service (DoS) attack. This could allow an attacker to disrupt the broadcasting services, leading to a loss of service availability.

tcpdump ISIS infinite loop DOS

The tcpdump program, specifically versions 3.8.x to 3.9.1, is vulnerable to a remote denial of service attack. This vulnerability is caused by a single (GRE) packet that triggers an infinite loop in the isis_print() function, which is used in many places by tcpdump. The bug lies in the TLV_ISNEIGH_VARLEN portion of the code, where providing a zero length causes the infinite loop.

DataTrac Activity Console DoS Exploit

The DataTrac Activity Console is vulnerable to a Denial of Service (DoS) attack. This exploit sends a malicious procedure to the server, causing it to become unresponsive and effectively denying service to legitimate users. The exploit code is written in C and uses the winsock2 library for network communication. It resolves the host, establishes a connection, and sends the bad procedure, resulting in the server being DoS'ed.

Recent Exploits: