Windows Layer 2 Tunneling Protocol (L2TP) Denial of Service Vulnerability
Windows TCP/IP Driver Denial of Service Vulnerability
Windows Active Directory Domain Services API Denial of Service Vulnerability
Windows Secure Channel Denial of Service Vulnerability
.NET Denial of Service Vulnerability
Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability
Windows iSCSI Service Denial of Service Vulnerability
Windows LSA Denial of Service Vulnerability
Windows Secure Channel Denial of Service Vulnerability
Microsoft Exchange Server Denial of Service Vulnerability
Windows TCP/IP Driver Denial of Service Vulnerability
Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability
Windows Secure Channel Denial of Service Vulnerability
Windows Standards-Based Storage Management Service Denial of Service Vulnerability
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
Microsoft Protected Extensible Authentication Protocol (PEAP) Denial of Service Vulnerability
Windows DNS Server Remote Code Execution Vulnerability
Bowser.sys Denial of Service Vulnerability
Windows iSCSI Discovery Service Denial of Service Vulnerability
Windows iSCSI Service Denial of Service Vulnerability
Windows AF_UNIX Socket Provider Denial of Service Vulnerability
PuTTY before 0.75 on Windows allows remote servers to cause a denial of service (Windows GUI hang) by telling the PuTTY window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. NOTE: the same attack methodology may affect some OS-level GUIs on Linux or other platforms for similar reasons.
Windows Remote Desktop Services Denial of Service Vulnerability
Server for NFS Denial of Service Vulnerability
ASP.NET Core Denial of Service Vulnerability
DHCP Server Service Denial of Service Vulnerability
Windows TCP/IP Driver Denial of Service Vulnerability
IBM Secure External Authentication Server 2.4.3.2, 6.0.1, 6.0.2 and IBM Secure Proxy 3.4.3.2, 6.0.1, 6.0.2 could allow a remote user to consume resources causing a denial of service due to a resource leak.
Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1.4 and 11.5.5 is vulnerable to a denial of service as the server terminates abnormally when executing a specially crafted SELECT statement. IBM X-Force ID: 200658.
Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) is vulnerable to a denial of service as the server terminates abnormally when executing a specially crafted SELECT statement. IBM X-Force ID: 200659.
Windows TCP/IP Driver Denial of Service Vulnerability
Windows TCP/IP Driver Denial of Service Vulnerability
Windows DNS Server Denial of Service Vulnerability
Windows DNS Server Denial of Service Vulnerability
Windows Network Address Translation (NAT) Denial of Service Vulnerability
A denial of service vulnerability exists when System.IO.Pipelines improperly handles requests, aka "System.IO.Pipelines Denial of Service." This affects .NET Core 2.1, System.IO.Pipelines, ASP.NET Core 2.1.
.NET Denial of Service Vulnerability
Internet Connection Sharing (ICS) Denial of Service Vulnerability
Microsoft AllJoyn API Denial of Service Vulnerability
Implementations of UDP application protocol are vulnerable to network loops. An unauthenticated attacker can use maliciously-crafted packets against a vulnerable implementation that can lead to Denial of Service (DOS) and/or abuse of resources.
.NET Framework Denial of Service Vulnerability
Windows Network Address Translation (NAT) Denial of Service Vulnerability
Windows TCP/IP Denial of Service Vulnerability
.NET Framework Denial of Service Vulnerability
A null pointer vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 could allow an attacker to crash the CGI program on affected installations.
zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
Microsoft AllJoyn API Denial of Service Vulnerability
ASP.NET Core and Visual Studio Denial of Service Vulnerability
There exists an auth bypass in Google Quickshare where an attacker can upload an unknown file type to a victim. The root cause of the vulnerability lies in the fact that when a Payload Transfer frame of type FILE is sent to Quick Share, the file that is contained in this frame is written to disk in the Downloads folder. Quickshare normally deletes unkown files, however an attacker can send two Payload transfer frames of type FILE and the same payload ID. The deletion logic will only delete the first file and not the second. We recommend upgrading past commit 5d8b9156e0c339d82d3dab0849187e8819ad92c0 or Quick Share Windows v1.0.2002.2
A vulnerability was found in ProSSHD 1.2 on Windows. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-251548.