Show filters
95 Total Results
Displaying 31-40 of 95
Sort by:
Attacker Value
Unknown
CVE-2006-1275
Disclosure Date: March 19, 2006 (last updated February 22, 2025)
GGZ Gaming Zone 0.0.12 allows remote attackers to cause a denial of service (client disconnect) via inputs that produce malformed XML, including (1) trailing ' (apostrophe) character on the ID attribute in a PLAYER XML tag, (2) joining with a long ID attribute or non-trailing ' characters, which causes a <none> name to be assigned, and then disconnecting, or (3) a long CDATA message attribute, which prevents closing tags from being added to the string.
0
Attacker Value
Unknown
CVE-2006-0047
Disclosure Date: March 07, 2006 (last updated February 22, 2025)
packets.c in Freeciv 2.0 before 2.0.8 allows remote attackers to cause a denial of service (server crash) via crafted packets with negative compressed size values.
0
Attacker Value
Unknown
CVE-2006-0883
Disclosure Date: March 07, 2006 (last updated February 22, 2025)
OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.
0
Attacker Value
Unknown
CVE-2006-0966
Disclosure Date: March 02, 2006 (last updated February 22, 2025)
NCP Network Communication Secure Client 8.11 Build 146, and possibly other versions, allows local users to cause a denial of service (CPU consumption) via a large number of arguments to ncprwsnt.exe, possibly due to a buffer overflow.
0
Attacker Value
Unknown
CVE-2006-0967
Disclosure Date: March 02, 2006 (last updated February 22, 2025)
NCP Network Communication Secure Client 8.11 Build 146, and possibly other versions, allows local users to cause a denial of service (memory usage and cpu utilization) via a flood of arbitrary UDP datagrams to ports 0 to 65000. NOTE: this issue was reported as a buffer overflow, but that term usually does not apply in flooding attacks.
0
Attacker Value
Unknown
CVE-2006-0911
Disclosure Date: February 28, 2006 (last updated February 22, 2025)
NmService.exe in Ipswitch WhatsUp Professional 2006 allows remote attackers to cause a denial of service (CPU consumption) via crafted requests to Login.asp, possibly involving the (1) "In]" and (2) "b;tnLogIn" parameters, or (3) malformed btnLogIn parameters, possibly involving missing "[" (open bracket) or "[" (closing bracket) characters, as demonstrated by "&btnLogIn=[Log&In]=&" or "&b;tnLogIn=[Log&In]=&" in the URL. NOTE: due to the lack of diagnosis by the original researcher, the precise nature of the vulnerability is unclear.
0
Attacker Value
Unknown
CVE-2006-0622
Disclosure Date: February 09, 2006 (last updated February 22, 2025)
QNX Neutrino RTOS 6.3.0 allows local users to cause a denial of service (hang) by supplying a "break *0xb032d59f" command to gdb.
0
Attacker Value
Unknown
CVE-2006-0454
Disclosure Date: February 07, 2006 (last updated February 22, 2025)
Linux kernel before 2.6.15.3 down to 2.6.12, while constructing an ICMP response in icmp_send, does not properly handle when the ip_options_echo function in icmp.c fails, which allows remote attackers to cause a denial of service (crash) via vectors such as (1) record-route and (2) timestamp IP options with the needaddr bit set and a truncated value.
0
Attacker Value
Unknown
CVE-2006-0362
Disclosure Date: January 22, 2006 (last updated February 22, 2025)
TippingPoint Intrusion Prevention System (IPS) TOS before 2.1.4.6324, and TOS 2.2.x before 2.2.1.6506, allow remote attackers to cause a denial of service (CPU consumption) via an unknown vector, probably involving an HTTP request with a negative number in the Content-Length header.
0
Attacker Value
Unknown
CVE-2006-0354
Disclosure Date: January 22, 2006 (last updated February 22, 2025)
Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644.
0