Exploits and Security Updates to Core Impact Threat Intelligence

Exploits and Security Updates to Core Impact Threat Intelligence

When you buy Core Impact, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Use the controls below to navigate Core Impact exploits and other modules.

Title Description Vulnerabilty Categorysort ascending Platform
XM Easy Personal FTP Server DoS XM Easy Personal FTP Server is prone to multiple remote denial-of- service vulnerabilities because it fails to properly handle user-supplied input. CVE-2006-2225 Denial of Service/Remote Windows
Iconics Genesis SCADA HMI Genbroker Server DoS GenBroker runs as a Windows service on port 38080 when Iconics Genesis 32 is installed. This service is affected by an integer overflow vulnerability during the handling of inbound packets, caused by the allocation of the memory needed for the creation of an array trusting the number of elements passed by the client. NOCVE-9999-47722 Denial of Service/Remote Windows
Microsoft Windows Active Directory Remote DoS (MS09-066) This module exploits an error in the Windows Active Directory implementation by sending a specially crafted LDAP request to crash the lsass.exe process, leading to the reboot of the target machine. CVE-2009-1928 Denial of Service/Remote Windows
Trihedral VTScada Integer Overflow DoS This module exploits a Integer Overflow vulnerability in the HTTP Server by sending a malformed packet to the 80/TCP port to crash the application. CVE-2014-9192 Denial of Service/Remote Windows
IIS FTP LIST Stack Exhaustion DoS Update This exploit forces the IIS process inetinfo.exe to throw an unhandled exception. IIS' behavior depends on the operating system version, its configuration and the system-wide debugger specified in the registry. This update adds more supported platforms to the exploit. CVE-2009-2521 Denial of Service/Remote Windows
Microsoft Windows SMB Pathname Overflow DoS (MS10-012) Update This update adds shared folders detection. This module exploits a vulnerability on srv.sys when it executes a rename command into shared folder using a long pathname. CVE-2010-0020 Denial of Service/Remote Windows
Microsoft ASP.NET Hash Table Collisions DoS (MS11-100) This module sends HTTP requests with specially crafted data making the ASP.NET subsystem consume lot of resources. This attack prevents the victim server from processing requests from legitimate clients and probably will make the server non-operational. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2011-3414 Denial of Service/Remote Windows
WireShark openSAFETY Dissector DoS This module exploits a vulnerability in the WireShark openSAFETY dissector, sending a specially crafted openSAFETY packet over UDP, causing WireShark to crash. CVE-2011-3484 Denial of Service/Remote Windows
IAX2 truncated header vulnerability DoS This module sends a series of UDP packets containing malformed IAX2 requests that will crash vulnerable listening IAX clients. If a broadcast IP address is specified, an entire subnetwork can be attacked in a single run. CVE-2006-2923 Denial of Service/Remote Windows
Symantec AMS Intel Handler Service DoS This module exploits a vulnerability in Symantec AMS Intel Handler service by sending a malformed packet to the 38292/TCP port to crash the application. CVE-2010-3268 Denial of Service/Remote Windows
Microsoft Windows Active Directory Browser Election Remote DoS This module exploits a vulnerability in Microsoft Windows Active Directory by sending a specially crafted Browser Election SMB packet that will crash the target machine. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. NOCVE-9999-47142 Denial of Service/Remote Windows
Solarwinds TFTP Read Request DoS This exploit shutdown the Solarwinds TFTP server, sending a crafted Read Request to the affected port. CVE-2010-2115 Denial of Service/Remote Windows
Microsoft Windows Active Directory Lightweight Directory Service DoS (MS13-079) This module exploits a vulnerability in "Microsoft Windows Active Directory Lightweight Directory" service by sending UDP requests to the LDAP port (usually 389) and then sending ICMP error messages producing a LDAP Stop Responding behavior. CVE-2013-3868 Denial of Service/Remote Windows
Apple CUPS IPP_TAG_UNSUPPORTED Handling null pointer DoS This module exploits a vulnerability in Apple CUPS, when handling the IPP_TAG_UNSUPPORTED which could be exploited by attackers to cause a remote pre-authentication denial of service. CVE-2009-0949 Denial of Service/Remote Linux, Mac OS X
Squid Web Proxy Cache HTTP Version Number DoS This module sends HTTP requests that causes the Squid Web Proxy to stop running. NOCVE-9999-35968 Denial of Service/Remote Linux
Apache Incomplete Header DoS This module creates a large number of connections to the Apache server that are left opened preventing it from accepting legitimate requests. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. NOCVE-9999-38787 Denial of Service/Remote Windows
Microsoft Windows SMB Server Stop Responding DoS (MS11-048) This module exploits a vulnerability on Microsoft Windows SMB Server via a SMB crafted packet. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2011-1267 Denial of Service/Remote Windows
Computer Associates eTrust Secure Content Manager DoS The eCS component (ECSQdmn.exe) in CA ETrust Secure Content Manager 8.0 and CA Gateway Security 8.1 allows remote attackers to cause a denial of service (crash) via a crafted request to port 1882, involving an incorrect integer calculation and a heap-based buffer overflow. CVE-2011-0758 Denial of Service/Remote Windows
Tembria Server Monitor HTTP Request DoS Tembria Server vulnerability is caused due to an error in the processing of HTTP requests sent to the included web server. CVE-2010-1316 Denial of Service/Remote Windows
ISC BIND Dynamic Update Message DoS Exploit Update A vulnerability has been identified in ISC BIND, which could be exploited by remote attackers to cause a denial of service. This issue is caused due to the "dns_db_findrdataset()" function failing when the prerequisite section of a dynamic update message contains a record of type "ANY" and where at least one RRset for this FQDN exists on the server, which could allow attackers to cause a vulnerable server to exit when receiving a specially crafted dynamic update message sent to a zone for which the server is the master. This update adds more supported platforms to the exploit. CVE-2009-0696 Denial of Service/Remote Solaris, AIX, Linux, Mac OS X
Microsoft Windows SMB 2.0 Negociate Protocol Request Remote BSOD DoS This module exploits a remote denial of service condition by sending a specially crafted SMB 2.0 packet to the target machine. Windows Vista and 7 are affected by this problem. This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. NOCVE-9999-40005 Denial of Service/Remote Windows
OpenBSD DHCP Remote DoS Update This module exploits a vulnerability in DHCP Server in OpenBSD. The vulnerability is caused due to the improper handling of DHCP requests within dhcpd in the cons_options() function in options.c. This cause a stack-based buffer corruption by sending a specially crafted DHCP request specifying a maximum message size smaller than 278. CVE-2007-5365 Denial of Service/Remote Linux, OpenBSD
Microsoft Windows Print Spooler Service Format String Vulnerability DoS (MS12-054) Update This update provides a better documentation for this module CVE-2012-1851 Denial of Service/Remote Windows
OpenBSD PF IP ICMPV6 Remote DoS OpenBSD's PF is prone to a remote denial-of-service vulnerability. Exploiting this issue allows remote attackers to cause a kernel panic on affected computers, denying further service to legitimate users. NOCVE-9999-37988 Denial of Service/Remote OpenBSD
IIS FTP Telnet IAC Remote DoS This modules causes a Denial of Service in module ftpsvc.dll contained in Microsoft IIS Server. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2010-3972 Denial of Service/Remote Windows
Microsoft WINS Service Failed Response Vulnerability DoS (MS11-035) Update This module exploits a vulnerability in the Microsoft WINS service by sending a request packet followed by a RESET connection packet to the service. CVE-2011-1248 Denial of Service/Remote Windows
Openfiler Remote Code Execution Exploit Insufficient sanitization in Openfile's /admin/system.html 'Hostname' field, leads to remote code execution. NOCVE-9999-65590 Exploits/Remote Code Execution Linux
Oracle Secure Backup Remote Command Execution Exploit This vulnerability allows remote attackers to bypass authentication on vulnerable installations of Oracle Secure Backup. User interaction is not required to exploit this vulnerability. The specific flaw exists in the logic used to authenticate a user to the administration server running on port 443. The script login.php does not properly sanitize the 'username' variable before using it in a database query. A specially crafted 'username' allows unauthorized attackers to log in with full administrative capabilities. CVE-2009-1977 Exploits/Remote Code Execution Windows, Solaris
Symantec Web Gateway blocked_file.php Remote Code Execution Exploit The spywall/blocked_file.php script of Symantec Web Gateway allows remote unauthenticated users to upload files with arbitrary extensions. This can be abused by attackers to execute arbitrary PHP code on vulnerable systems. CVE-2012-0299 Exploits/Remote Code Execution Linux
Oracle Secure Backup Remote Command Execution Exploit Update This vulnerability allows remote attackers to bypass authentication on vulnerable installations of Oracle Secure Backup. User interaction is not required to exploit this vulnerability. The specific flaw exists in the logic used to authenticate a user to the administration server running on port 443. The script login.php does not properly sanitize the 'username' variable before using it in a database query. A specially crafted 'username' allows unauthorized attackers to log in with full administrative capabilities. This update adds Solaris support. CVE-2009-1977 Exploits/Remote Code Execution Windows, Solaris