Core Impact Pro Exploits and Security Updates

When you buy Core Impact Pro, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact Pro. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact Pro keeps you there.

Use the controls below to navigate Core Impact exploits and other modules.

Released Datesort ascending Title Description Vulnerabilty Category Platform
01.28.2015 Microsoft Internet Explorer CMarkup Object Use-After-Free Exploit (MS14-021) Update 3 Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. This update adds support for Internet Explorer 11. CVE-2014-1776 Exploits/Client Side Windows
01.28.2015 Oracle Forms and Reports Remote Code Execution Exploit This vulnerabilities allows remote attackers writing to the host filesystem on vulnerable installations of software utilizing Oracle Forms and Reporting. CVE-2012-3152 Exploits/Remote Windows
01.28.2015 CorelCAD Multiple DLL Hijacking Exploit Untrusted search path vulnerability in CorelCAD 2014.5 Build 14.4.51 and earlier, and possibly other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse FxManagedCommands_3.08_9.tx or TD_Mgd_3.08_9.dll that is located in the same folder as an .dwt file. CVE-2014-8394 Exploits/Client Side Windows
01.28.2015 AV Evasion Improvements v2 This update updates AV evasion for agents generated using the binary wrapper, which is used by Package and Register, Serve Agent in Web Server, and similar executable generating modules. Exploits/Remote
01.28.2015 Corel FastFlix Multiple DLL Hijacking Exploit Untrusted search path vulnerability in Corel FastFlix 17.0.0.249 and earlier, and possibly other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse igfxcmrt32.dll or ipl.dll or MSPStyleLib.dll or uFioUtil.dll or uhDSPlay.dll or uipl.dll or uvipl.dll or VC1DecDll.dll or VC1DecDll_SSE3.dll that is located in the same folder as an .vfp file. CVE-2014-8398 Exploits/Client Side Windows
01.27.2015 GHOST glibc gethostbyname Buffer Overflow Verifier This update includes a module that executes a program designed to test a buffer overflow in glibc's __nss_hostname_digits_dots function. The function is used by the gethostbyname*() functions family used for name resolution. Under some circumstances, the use of those functions when the vulnerable underlying function is present, may lead to remote code execution, privilege escalation, or information disclosure. CVE-2015-0235 Exploits/Tools Linux
01.23.2015 Git Insecure Path Component Exploit CVE-2014-9390: Git is prone to a vulnerability that may allow attackers to overwrite arbitrary local files. This module exploits the condition and installs an Agent when a vulnerable GIT client performs a CLONE to the fake repository created. CVE-2014-9390 Exploits/Client Side Mac OS X, Windows
01.20.2015 Corel VideoStudio Pro X7 and FastFlix u32ZLib DLL Hijacking Exploit Untrusted search path vulnerability in Corel VideoStudio Pro X7 17.0.0.249 and Corel FastFlix 17.0.0.249 and earlier, and possibly other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse u32ZLib.dll that is located in the same folder as an .vsp or .vfp file. CVE-2014-8397 Exploits/Client Side Windows
01.19.2015 Microsoft Windows Telnet Server ProcessDataReceivedOnSocket DoS (MS15-002) Update A stack-based buffer overflow in the ProcessDataReceivedOnSocket function in the Microsoft Telnet Server Helper (tlntsess.exe) can be used by remote unauthenticated attackers to render the Telnet server unresponsive. This update improves the way in which this module detects if the attack was successful. CVE-2015-0014 Denial of Service/Remote Windows
01.18.2015 Kerberos Checksum Remote Privilege Escalation Exploit (MS14-068) Update A vulnerability in Microsoft's implementation of the Kerberos authentication protocol allows to modify a Kerberos ticket to remotely escalate privileges. This module exploits the vulnerability impersonating a user of the domain's Administrators group to install an agent in the domain controller with System privileges. This update improves on the information associated with the installed agent in case of success of the module. CVE-2014-6324 Exploits/Remote Windows
01.18.2015 Microsoft Windows Telnet Server ProcessDataReceivedOnSocket DoS (MS15-002) A stack-based buffer overflow in the ProcessDataReceivedOnSocket function in the Microsoft Telnet Server Helper (tlntsess.exe) can be used by remote unauthenticated attackers to render the Telnet server unresponsive. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2015-0014 Denial of Service/Remote Windows
01.14.2015 Corel Painter Wacommt DLL Hijacking Exploit Untrusted search path vulnerability in Corel Painter 2015 14.0.0.728 and earlier, and possibly other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse wacommt.dll that is located in the same folder as an .rif file. CVE-2014-8395 Exploits/Client Side Windows
01.14.2015 Corel PDF Fusion Quserex DLL Hijacking Exploit Untrusted search path vulnerability in Corel PDF Fusion 1.12 Build 16/04/2013 and earlier, and possibly other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse quserex.dll that is located in the same folder as an .pdf file. CVE-2014-8396 Exploits/Client Side Windows
01.13.2015 Microsoft Windows Ancillary Function Driver Double Free Vulnerability Exploit (MS14-040) Update 3 This module exploits a double-free vulnerability in "afd.sys" by calling to "AfdTransmiteFile" function with crafted parameters. This update adds support to Windows 2003, Windows Vista, Windows 2008, Windows 7, Windows 2008 R2, Windows 8 and Windows 2012 (all 64 bit versions). CVE-2014-1767 Exploits/Local Windows
12.15.2014 DHCP Server improvements This update introduces improvements and fixes to classes related to DHCP servers. Exploits/Tools
12.12.2014 Kerberos Checksum Remote Privilege Escalation Exploit (MS14-068) A vulnerability in Microsoft's implementation of the Kerberos authentication protocol allows to modify a Kerberos ticket to remotely escalate privileges. This module exploits the vulnerability impersonating a user of the domain's Administrators group to install an agent in the domain controller with System privileges. This update introduces the option to use NTLM hashes for authentication and Network RPT-AP integration. CVE-2014-6324 Exploits/Remote Windows
12.11.2014 3S Pocketnet Tech VMS PocketNetNVRMediaClientAxCtrl.NVRMediaViewer.1 SaveCurrentImageEx Buffer Overflow Exploit The specific flaw exists within the PocketNetNVRMediaClientAxCtrl.NVRMediaViewer.1 control. The SaveCurrentImageEx method copies an attacker provided filename into a fixed size buffer. CVE-2014-9263 Exploits/Client Side Windows
12.04.2014 Microsoft Windows Administrator UAC Elevation Bypass Update This module abuses a design flaw in the way Microsoft Windows implements a UAC whitelist. The flaw could allow a process running with Medium Integrity to elevate itself to High Integrity without a UAC prompt when the process is run from an account in the administrators group. NOCVE-9999-64489 Exploits/Local Windows
12.03.2014 Linux Kernel libfutex Privilege Escalation Exploit This module exploits a vulnerability in the Linux Kernel. The futex_requeue function in kernel/futex.c in the Linux kernel does not ensure that calls have two different futex addresses, which allows local attackers to gain privileges via a crafted FUTEX_REQUEUE command. CVE-2014-3153 Exploits/Local Linux
11.27.2014 Microsoft Windows Schannel Heap Overflow DoS (MS14-066) Update This module exploits a vulnerability in "schannel.dll" by sending a crafted certificate packet to the "Internet Information Services" server via TLS protocol producing a heap overflow in the critical LSASS Windows process. This update reduces the time of the target exploitation. Besides, all targets supported are added in the documentation. CVE-2014-6321 Denial of Service/Remote Windows
11.27.2014 DLLMakerV2 Library Update This update makes a new version of DLLMaker library available to exploits. New features and fixes: + Compatibility with PROCESS_MITIGATION_ASLR_POLICY process creation flags. + fixes IAT inconsistencies + new sections: .reloc, .rsrc. + adds VS_VERSION_INFO resource Exploits/Tools
11.20.2014 Microsoft Internet Explorer CInput Object Use-After-Free Exploit(MS14-035) A use after free vulnerability exists in Internet Explorer. The vulnerability is due to accessing a freed CInput object in memory. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious web page. In the case of successful exploitation, arbitrary attacker code would be executed in the security context of the target user. CVE-2014-0282 Exploits/Client Side Windows
11.19.2014 Microsoft Windows Schannel Heap Overflow DoS (MS14-066) This module exploits a vulnerability in "schannel.dll" by sending a crafted certificate packet to the "Internet Information Services" server via TLS protocol producing a heap overflow in the critical LSASS Windows process. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released versionin order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2014-6321 Denial of Service/Remote Windows
11.18.2014 Advantech Webaccess webeye Connect Buffer Overflow Exploit The specific flaw exists within the Connect method in webeye.ocx module.The control does not check the length of an attacker-supplied string in the Connect method before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process. CVE-2014-8388 Exploits/Client Side Windows
11.18.2014 Advantech ADAMView GNI File Buffer Overflow Exploit ADAMView is prone to a buffer overflow when handling specially crafted GNI files CVE-2014-8386 Exploits/Client Side Windows
11.17.2014 Microsoft Windows OLE Automation Array Remote Code Execution Exploit (MS14-064) Update An integer overflow in OLE allows remote code execution. This update contains a module exploiting the vulnerability by hosting a web site and epxloiting connecting Internet Explorer browsers. CVE-2014-6332 Exploits/Client Side Windows
11.16.2014 Eudora Qualcomm WorldMail IMAPd Service UID Buffer Overflow Exploit Eudora Qualcomm WorldMail IMAPd Service is prone to a buffer overflow SEH gets overwritten when using UID command. NOCVE-9999-67004 Exploits/Remote Windows
11.14.2014 Microsoft Windows OLE Automation Array Remote Code Execution Exploit (MS14-064) An integer overflow in OLE allows remote code execution. This update contains a module exploiting the vulnerability by hosting a web site and epxloiting connecting Internet Explorer browsers. CVE-2014-6332 Exploits/Client Side Windows
11.12.2014 DHCP Server with Bash Variables Injection Exploit This update includes a module implementing a DHCP server that'll attack querying hosts using the GNU Bash Environment Variables Injection vulnerability. CVE-2014-6271 Exploits/Tools Linux
11.12.2014 MSRPC Server Service Remote Buffer Overflow Exploit (MS08-067) Update 6 This module exploits a vulnerability in the Microsoft Windows Server service by sending a specially crafted RPC request. This update adds support for Windows XP sp0 and sp1. CVE-2008-4250 Exploits/Remote Windows

Pages