Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dos vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-31309
HTTP/2 CONTINUATION DoS attack can cause Apache Traffic Server to consume more resources on the server. Version from 8.0.0 up to and including 8.1.9, from 9.0.0 up to and including 9.2.3 are affected. Users can set a new setting (proxy.config.http2.max_continuation_frames_per_min...
1 Article
7.1
CVSSv3
CVE-2016-6896
Directory traversal vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress 4.5.3 allows remote authenticated users to cause a denial of service or read certain text files via a .. (dot dot) in the plugin parameter to wp-admin/admin-...
Wordpress Wordpress 4.5.3
1 EDB exploit
2 Metasploit modules
7.5
CVSSv3
CVE-2023-3967
Allocation of Resources Without Limits or Throttling vulnerability in Hitachi Ops Center Common Services on Linux allows DoS.This issue affects Hitachi Ops Center Common Services: prior to 10.9.3-00.
Hitachi Ops Center Common Services
NA
CVE-2009-0756
The JBIG2Stream::readSymbolDictSeg function in Poppler prior to 0.10.4 allows remote malicious users to cause a denial of service (crash) via a PDF file that triggers a parsing error, which is not properly handled by JBIG2SymbolDict::~JBIG2SymbolDict and triggers an invalid memor...
Poppler Poppler 0.1
Poppler Poppler 0.1.1
Poppler Poppler 0.3.2
Poppler Poppler 0.5.91
Poppler Poppler 0.4.2
Poppler Poppler 0.4.3
Poppler Poppler 0.5.90
Poppler Poppler 0.5.9
Poppler Poppler
Poppler Poppler 0.3.0
Poppler Poppler 0.3.1
Poppler Poppler 0.7.0
Poppler Poppler 0.7.3
Poppler Poppler 0.5.1
Poppler Poppler 0.5.0
Poppler Poppler 0.4.4
Poppler Poppler 0.6.1
Poppler Poppler 0.6.0
Poppler Poppler 0.2.0
Poppler Poppler 0.10.1
Poppler Poppler 0.7.2
Poppler Poppler 0.6.4
1 EDB exploit
NA
CVE-2007-4733
The Aztech DSL600EU router, when WAN access to the web interface is disabled, does not properly block inbound traffic on TCP port 80, which allows remote malicious users to connect to the web interface by guessing a TCP sequence number, possibly involving spoofing of an ARP packe...
Aztech Dsl 600eu Router
7.5
CVSSv3
CVE-2018-21036
Sails.js before v1.0.0-46 allows malicious users to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request.
Sailsjs Sails
NA
CVE-2006-0340
Unspecified vulnerability in Stack Group Bidding Protocol (SGBP) support in Cisco IOS 12.0 up to and including 12.4 running on various Cisco products, when SGBP is enabled, allows remote attackers on the local network to cause a denial of service (device hang and network traffic ...
Cisco Ios 12.0xa
Cisco Ios 12.0xc
Cisco Ios 12.0xk
Cisco Ios 12.0xl
Cisco Ios 12.1ez
Cisco Ios 12.1ga
Cisco Ios 12.1xl
Cisco Ios 12.1xm
Cisco Ios 12.1xz
Cisco Ios 12.1ya
Cisco Ios 12.2cx
Cisco Ios 12.2dd
Cisco Ios 12.2t
Cisco Ios 12.2xa
Cisco Ios 12.2xs
Cisco Ios 12.2xt
Cisco Ios 12.2xv
Cisco Ios 12.2yy
Cisco Ios 12.2yz
Cisco Ios 12.3
Cisco Ios 12.3b
Cisco Ios 12.3xi
NA
CVE-2006-0405
The TIFFFetchShortPair function in tif_dirread.c in libtiff 3.8.0 allows remote malicious users to cause a denial of service (application crash) via a crafted TIFF image that triggers a NULL pointer dereference, possibly due to changes in type declarations and/or the TIFFVSetFiel...
Libtiff Libtiff 3.8.0
5.5
CVSSv3
CVE-2019-14333
An issue exists on D-Link 6600-AP and DWL-3600AP Ax 4.2.0.14 21/03/2019 devices. There is a pre-authenticated denial of service attack against the access point via a long action parameter to admin.cgi.
Dlink 6600-ap Firmware 4.2.0.14
Dlink Dwl-3600ap Firmware 4.2.0.14
5.5
CVSSv3
CVE-2019-14335
An issue exists on D-Link 6600-AP and DWL-3600AP Ax 4.2.0.14 21/03/2019 devices. There is post-authenticated denial of service leading to the reboot of the AP via the admin.cgi?action=%s URI.
Dlink 6600-ap Firmware 4.2.0.14
Dlink Dwl-3600ap Firmware 4.2.0.14
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »