Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| MikroTik | RouterOS-TFTP | * ~ 7.13.2 | - | |
| Microsoft | WDS | * | - | |
| dproxy-nexgen | dproxy-nexgen | 0.1 ~ 0.5 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | This Python script automates the process of scanning for systems potentially vulnerable to the Loop DoS attack and the hypothetical CVE-2024-2169 vulnerability. It focuses on scanning ports associated with protocols susceptible to denial-of-service (DoS) attacks. The script can be used for educational purposes or authorized penetration testing. | https://github.com/douglasbuzatto/G3-Loop-DoS | POC Details |
| 2 | This Python script automates the process of scanning for systems potentially vulnerable to the Loop DoS attack and the hypothetical CVE-2024-2169 vulnerability. It focuses on scanning ports associated with protocols susceptible to denial-of-service (DoS) attacks. The script can be used for educational purposes or authorized penetration testing. | https://github.com/renancesarr/G3-Loop-DoS | POC Details |
No public POC found.
Login to generate AI POCNo comments yet