1 results (0.042 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

Implementations of UDP application protocol are vulnerable to network loops. An unauthenticated attacker can use maliciously-crafted packets against a vulnerable implementation that can lead to Denial of Service (DOS) and/or abuse of resources. • https://github.com/douglasbuzatto/G3-Loop-DoS https://kb.cert.org/vuls/id/417980 https://www.kb.cert.org/vuls/id/417980 •