header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

TP-Link VN020 F3v(T) TT_V6.2.1021 – Denial Of Service (DOS)

Two critical vulnerabilities found in TP-Link VN020-F3v(T) router's UPnP implementation affecting the WANIPConnection service. These vulnerabilities enable unauthenticated attackers to trigger denial of service and potential memory corruption via malformed SOAP requests.

Denial of Service (DoS) in K7 Ultimate Security K7RKScan.sys

The K7 Ultimate Security version less than 17.0.2019, specifically the driver file K7RKScan.sys version 15.1.0.7, allows local users to perform a Denial of Service (DoS) attack by triggering a null pointer dereference from IOCtl 0x222010 and 0x222014. The driver is accessible to all users in the 'Everyone' group, potentially leading to a system crash (BSOD) or other unspecified impacts.

minaliC 2.0.0 – Denial of Service (DoS)

The exploit targets minaliC 2.0.0 on Windows XP Professional Service Pack 2 and 3 (English). By sending a large amount of data via the GET method to the web server, the server crashes upon receiving and processing the request, leading to denial of service. Successful exploitation of this vulnerability allows remote attackers to disrupt the server, affecting legitimate users.

Electrolink FM/DAB/TV Transmitter Unauthenticated Remote DoS

An unauthenticated attacker can exploit Electrolink FM/DAB/TV Transmitter systems, affecting versions ranging from 10W to 30kW, leading to a remote Denial of Service (DoS) condition. By sending specially crafted requests, the attacker can disrupt the normal operation of the transmitters, potentially causing service interruptions or downtime.

Electrolink FM/DAB/TV Transmitter Unauthenticated Remote DoS

Electrolink FM/DAB/TV Transmitters with web version 01.09, 01.08, and 01.07, display version 1.4 and 1.2, and control unit version 01.06, 01.04, and 01.03 are vulnerable to an unauthenticated remote Denial of Service (DoS) attack. This could allow an attacker to disrupt the broadcasting services, leading to a loss of service availability.

tcpdump ISIS infinite loop DOS

The tcpdump program, specifically versions 3.8.x to 3.9.1, is vulnerable to a remote denial of service attack. This vulnerability is caused by a single (GRE) packet that triggers an infinite loop in the isis_print() function, which is used in many places by tcpdump. The bug lies in the TLV_ISNEIGH_VARLEN portion of the code, where providing a zero length causes the infinite loop.

DataTrac Activity Console DoS Exploit

The DataTrac Activity Console is vulnerable to a Denial of Service (DoS) attack. This exploit sends a malicious procedure to the server, causing it to become unresponsive and effectively denying service to legitimate users. The exploit code is written in C and uses the winsock2 library for network communication. It resolves the host, establishes a connection, and sends the bad procedure, resulting in the server being DoS'ed.

Recent Exploits: