Core Impact Security and Penetration Testing Updates

Core Impact Threat Intelligence Exploits, Security and Penetration Testing Updates

When you buy Core Impact, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Use the controls below to navigate Core Impact exploits and other modules.

Title Description Vulnerabilty Categorysort ascending Platform
ISC DHCP Remote DoS Update This module exploits a vulnerability in ISC DHCP Server. The vulnerability is caused due to the improper handling of DHCP requests within dhcpd in the cons_options() function in options.c. This causes a stack-based buffer corruption by sending a specially crafted DHCP request specifying a maximum message size smaller than 278 bytes. This update adds support for Linux. CVE-2007-5365 Denial of Service/Remote Linux, OpenBSD
MSRPC WKSSVC NetrGetJoinInformation Heap Corruption DoS (MS09-041) This module exploits an improperly memory free by sending a specially crafted RPC packet to cause a DoS condition on the target machine. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2009-1544 Denial of Service/Remote Windows
Microsoft Windows LSASS Memory Corruption DoS (MS16-137) This module exploits an exceptcional condition in "lsasrv.dll" by sending a crafted "Session Setup Request" SMBv1 or SMBv2 packet that is affected during the NTML Auth message. CVE-2016-7237 Denial of Service/Remote Windows
Microsoft Windows Active Directory Browser Election Remote DoS This module exploits a vulnerability in Microsoft Windows Active Directory by sending a specially crafted Browser Election SMB packet that will crash the target machine. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. NOCVE-9999-47142 Denial of Service/Remote Windows
Cerberus FTP Server Long Command DoS Cerberus FTP Server is prone to a denial-of-service. The vulnerability is caused due to an error in the processing of overly long arguments passed via FTP commands. NOCVE-9999-40396 Denial of Service/Remote Windows
HP Data Protector Manager RDS DoS The RDS service (rds.exe) in HP Data Protector Manager 6.11 allows remote attackers to cause a denial of service via a packet with a large data size to TCP port 1530. CVE-2011-0514 Denial of Service/Remote Windows
Microsoft Windows Remote Desktop Protocol DoS (MS12-020) Update This update fixes the failure when running this module on multiple systems. CVE-2012-0002 Denial of Service/Remote Windows
Microsoft IIS FastCGI HTTP Header Remote DoS (MS10-065) This module exploits a memory corruption in Microsoft Internet Information Server by sending a specially crafted HTTP request. CVE-2010-2730 Denial of Service/Remote Windows
Computer Associates eTrust Secure Content Manager DoS The eCS component (ECSQdmn.exe) in CA ETrust Secure Content Manager 8.0 and CA Gateway Security 8.1 allows remote attackers to cause a denial of service (crash) via a crafted request to port 1882, involving an incorrect integer calculation and a heap-based buffer overflow. CVE-2011-0758 Denial of Service/Remote Windows
IBM Tivoli Directory Server SASL Bind Request DoS IBM Tivoli Directory Server incorrectly handles LDAP CRAM-MD5 packets which leads to a denial of service. CVE-2011-1206 Denial of Service/Remote Windows
Solaris ICMP Packet Remote DoS This module exploits a vulnerability in Solaris 10. The vulnerability is caused due to the improper handling of ICMP packets by the Solaris Operating System. CVE-2007-0634 Denial of Service/Remote Solaris
Microsoft Windows TCPIP SACK Remote DoS (MS10-009) This module exploits a memory corruption in the Microsoft Windows TCP/IP implementation by sending a sequence of TCP/IP packets with a specially crafted Selective Acknowledgement (SACK) values. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2010-0242 Denial of Service/Remote Windows
Novell ZENworks Configuration Management TFTPD Remote DoS The flaw exists within the novell-tftp.exe component which listens by default on UDP port 69. When handling a request the process blindly copies user supplied data into a fixed-length buffer on the heap. CVE-2010-4323 Denial of Service/Remote Windows
Active Directory LDAP Request Handling DoS (MS08-060) Active Directory, which is an essential component of the Windows 2000 architecture, presents organizations with a directory service designed for distributed computing environments. Active Directory allows organizations to centrally manage and share information on network resources and users while acting as the central authority for network security. The directory services provided by Active Directory are based on the Lightweight Directory Access Protocol (LDAP) and thus Active Directory objects can be stored and retrieved using the LDAP protocol. A vulnerability in Active Directory allows an attacker to crash and force a reboot of any Windows 2000 Server running the Active Directory service. CVE-2008-4023 Denial of Service/Remote Windows
Microsoft Windows TCP IPv6 Router Advertisement Message DoS (MS14-006) This module exploits a vulnerability in tcpip.sys by sending a big number of router advertisement messages to the target causing a stop responding behavior. CVE-2014-0254 Denial of Service/Remote Windows
Microsoft Windows LSASS Memory Corruption DoS (MS17-004) This module exploits an exceptional condition in "lsasrv.dll" by sending a crafted "Session Setup Request" SMBv1 or SMBv2 packet that is affected during the NTML Auth message. CVE-2017-0004 Denial of Service/Remote Windows
Control Microsystems ClearSCADA Remote DoS Update This module exploits a vulnerability in the ClearSCADA Server service by sending a malformed packet to the 5481/TCP port to crash the application. This Update increases the MAX TRIES default value because it has not been reliable. CVE-2011-3143 Denial of Service/Remote Windows
Microsoft Windows Schannel Heap Overflow DoS (MS14-066) This module exploits a vulnerability in "schannel.dll" by sending a crafted certificate packet to the "Internet Information Services" server via TLS protocol producing a heap overflow in the critical LSASS Windows process. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released versionin order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2014-6321 Denial of Service/Remote Windows
Serva32 HTTP Server GET command DoS Serva32 is prone to a denial of service vulnerability when handling malformed GET commands. NOCVE-9999-48334 Denial of Service/Remote Windows
Solar FTP Server DoS Solar FTP Server is prone to a Denial of Service condition. It fails to properly sanitize user-supplied input with a specially crafted "USER" command, a remote attacker can potentially disable the FTP service. NOCVE-9999-47271 Denial of Service/Remote Windows
Microsoft Windows SMB Trans Buffer Overflow DoS (MS09-001) This module exploits a remote vulnerability on Trans operation via a malformed CreateWithSdOrEa SMB command on the srv.sys driver. CVE-2008-4834 Denial of Service/Remote Windows
TYPSoft FTP Server RETR DoS This module shuts down the TYPSoft FTP Server because it fails to properly handle user-supplied malformed packets using for login the Anonymous user provided by default for the program CVE-2005-3294 Denial of Service/Remote Windows
Microsoft ASP.NET Hash Table Collisions DoS (MS11-100) Update This module sends HTTP requests with specially crafted data making the ASP.NET subsystem consume lot of resources. This attack prevents the victim server from processing requests from legitimate clients and probably will make the server non-operational. This update fixes an issue when launching the module from an agent running in a Linux system. CVE-2011-3414 Denial of Service/Remote Windows
Microsoft Windows Schannel Heap Overflow DoS (MS14-066) Update This module exploits a vulnerability in "schannel.dll" by sending a crafted certificate packet to the "Internet Information Services" server via TLS protocol producing a heap overflow in the critical LSASS Windows process. This update reduces the time of the target exploitation. Besides, all targets supported are added in the documentation. CVE-2014-6321 Denial of Service/Remote Windows
Microsoft Windows Remote Desktop Protocol DoS (MS12-020) This module triggers a memory corruption vulnerability in the Remote Desktop Service by sending a malformed packet to the 3389/TCP port. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2012-0002 Denial of Service/Remote Windows
IAX2 truncated header vulnerability DoS This module sends a series of UDP packets containing malformed IAX2 requests that will crash vulnerable listening IAX clients. If a broadcast IP address is specified, an entire subnetwork can be attacked in a single run. CVE-2006-2923 Denial of Service/Remote Windows
BakBone NetVault SmartDisk Integer Overflow DoS This module hangs the BakBone NetVault SmartDisk Server because it fails to properly handle user-supplied malformed packets. NOCVE-9999-48284 Denial of Service/Remote Windows
Control Microsystems ClearSCADA Remote DoS This module exploits a vulnerability in the ClearSCADA Server service by sending a malformed packet to the 5481/TCP port to crash the application. NOCVE-9999-47161 Denial of Service/Remote Windows
Microsoft Firewall Remote DoS This module exploits a vulnerability in the Microsoft Windows NAT Helper Component (ipnathlp.dll) when Internet Connection Sharing is enabled, sending a specially crafted DNS query. CVE-2006-5614 Denial of Service/Remote Windows
Symantec AMS Intel Handler Service DoS This module exploits a vulnerability in Symantec AMS Intel Handler service by sending a malformed packet to the 38292/TCP port to crash the application. CVE-2010-3268 Denial of Service/Remote Windows