Denial of Service
Denial of Service (DoS) vulnerabilities allow attackers to make a system or service unavailable to legitimate users by overwhelming resources or exploiting flaws that cause crashes.
4
MEDIUM
General
Understanding Denial of Service
Detailed information about this vulnerability type.
How to Identify
- •Review security advisories
- •Perform regular security testing
Prevention Best Practices
- ✓Follow security best practices
- ✓Keep systems updated
Denial of Service CVEs (4)
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-66676 | 6.2 | This vulnerability allows an attacker to crash the IObit Unlocker software by sending a specially crafted request, which can disrupt its normal operation. To exploit this, the attacker needs to have the ability to send requests to the software, potentially affecting users who rely on it for file management. | Unknown | Exploit Available | 7 days agoFeb 13, 2026 |
| CVE-2026-2026 | 5.4 | This vulnerability allows an attacker to gain unauthorized access to the Nessus Agent directory on Windows systems, which could lead to Denial of Service (DoS) attacks that disrupt service. It occurs due to weak file permissions, meaning if an attacker can reach that directory, they could exploit it to cause problems. | Unknown | Exploit Available | 7 days agoFeb 13, 2026 |
| CVE-2025-67433 | 0.0 | An attacker can send a specially crafted DATA packet to the Open TFTP Server, causing it to crash and become unavailable, resulting in a Denial of Service. This vulnerability occurs when the server processes requests and does not handle certain data correctly, but it requires the attacker to have network access to the server. | Unknown | Theoretical | 8 days agoFeb 12, 2026 |
| CVE-2025-67432 | 7.5 | This vulnerability allows attackers to crash the system by sending specially crafted input to the ZBarcode_Encode function in the MBS DynaPDF Plugin. To exploit this, the attacker needs access to the application using the plugin, which means they could potentially disrupt services for users. | Unknown | Theoretical | 8 days agoFeb 12, 2026 |