A novel traffic-loop vulnerability has been identified against certain implementations of UDP-based applications protocols. An unauthenticated attacker can use maliciously-crafted packets against a ...
Terms can sometimes play tricks on the mind. Take EtherNet/IP, for example. Many people will read “IP” as internet protocol and think that EtherNet/IP refers to plain old, standard industrial Ethernet ...
Security researchers are sounding the alarm about the Web Services Dynamic Discovery (WS-DD, WSD, or WS-Discovery) protocol, which they say can be abused to launch pretty massive DDoS attacks. ZDNet ...
Broadband Forum has released the next update of its User Datagram Protocol (UDP)-based Speed Test (UDPST) utility, a development that will help broadband operators deploy new gigabit services and ...
Hundreds of thousands of devices can be abused to amplify distributed denial-of-sevice (DDoS) attacks because they are misconfigured to listen and respond to WS-Discovery protocol requests over the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results