The Apache ActiveMQ version 6.1.6 is prone to a Denial of Service (DOS) vulnerability. An attacker can exploit this vulnerability by sending specially crafted requests to the server, causing it to become unresponsive or crash.
Two critical vulnerabilities found in TP-Link VN020-F3v(T) router's UPnP implementation affecting the WANIPConnection service. These vulnerabilities enable unauthenticated attackers to trigger denial of service and potential memory corruption via malformed SOAP requests.
The K7 Ultimate Security version less than 17.0.2019, specifically the driver file K7RKScan.sys version 15.1.0.7, allows local users to perform a Denial of Service (DoS) attack by triggering a null pointer dereference from IOCtl 0x222010 and 0x222014. The driver is accessible to all users in the 'Everyone' group, potentially leading to a system crash (BSOD) or other unspecified impacts.
The exploit targets minaliC 2.0.0 on Windows XP Professional Service Pack 2 and 3 (English). By sending a large amount of data via the GET method to the web server, the server crashes upon receiving and processing the request, leading to denial of service. Successful exploitation of this vulnerability allows remote attackers to disrupt the server, affecting legitimate users.
The exploit targets RouterOS devices with versions ranging from 6.40.5 to 6.44 and 6.48.1 to 6.49.10. By sending a crafted packet, it can cause a denial of service condition on the target device. This vulnerability is identified as CVE-2024-27686.
An unauthenticated attacker can exploit Electrolink FM/DAB/TV Transmitter systems, affecting versions ranging from 10W to 30kW, leading to a remote Denial of Service (DoS) condition. By sending specially crafted requests, the attacker can disrupt the normal operation of the transmitters, potentially causing service interruptions or downtime.
Electrolink FM/DAB/TV Transmitters with web version 01.09, 01.08, and 01.07, display version 1.4 and 1.2, and control unit version 01.06, 01.04, and 01.03 are vulnerable to an unauthenticated remote Denial of Service (DoS) attack. This could allow an attacker to disrupt the broadcasting services, leading to a loss of service availability.
This exploit is a Denial of Service (DoS) attack that targets the HTTP protocol. It sends a specially crafted GET request that causes the server to consume excessive resources and become unresponsive.
The tcpdump program, specifically versions 3.8.x to 3.9.1, is vulnerable to a remote denial of service attack. This vulnerability is caused by a single (GRE) packet that triggers an infinite loop in the isis_print() function, which is used in many places by tcpdump. The bug lies in the TLV_ISNEIGH_VARLEN portion of the code, where providing a zero length causes the infinite loop.
The DataTrac Activity Console is vulnerable to a Denial of Service (DoS) attack. This exploit sends a malicious procedure to the server, causing it to become unresponsive and effectively denying service to legitimate users. The exploit code is written in C and uses the winsock2 library for network communication. It resolves the host, establishes a connection, and sends the bad procedure, resulting in the server being DoS'ed.