This Metasploit module exploits a vulnerability in certain versions of rpcbind, LIBTIRPC, and NTIRPC, allowing an attacker to trigger large (and never freed) memory allocations for XDR strings on the target.
9cb9f42f23398bceca7a6b058d3843930866bd713221a166b211f3635a4bab18
FreeBSD Security Advisory - A function extracting the length from type-length-value encoding is not properly validating the submitted length. A remote user could cause, for example, an out-of-bounds read, decoding of unrelated data, or trigger a crash of the software such as bsnmpd resulting in a denial of service.
f03bcb9feddf2d950ed61f77228c3a12e63a2a09995ac33ae2fea33ab21e623b
RPCBind / libtirpc denial of service exploit.
d0ca6273bf34f85942ea8f97a7137b04ccf6c78c845b743af2ade8ba0a24ca25
OpenSSL version 1.1.0 remote client denial of service proof of concept exploit.
964cd481b9abdff9f9960aba02aa087e5cdcad73beec5a68da63a8dd496bc4a2
Double-free and invalid-free vulnerabilities in x509 parsing were found in the latest OpenSSL (1.1.0b).
84e0be7df2d3c2e2d251ffdb420dc03c362c9b13bd364133b5db39a3fee9d934