CORE Impact Pro Exploits and Security Updates

When you buy CORE Impact Pro, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within CORE Impact Pro. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because CORE Impact Pro keeps you there.

Use the controls below to navigate CORE Impact exploits and other modules.

Released Datesort ascending Title Description Vulnerabilty Category Platform
10.27.2013 TinyWebGallery Remote Code Execution Exploit Update This module exploits a TinyWebGallery local file-include vulnerability because TinyWebGallery fails to properly sanitize user-supplied input. The module takes advantage of the logging capabilities of the attacked software to remotely execute arbitrary code. This update fixes some issues related with an updated library. Support for various platforms was added. CVE-2009-1911 Exploits/Remote Windows, Solaris, Linux
10.24.2013 PineApp Mail-SeCure ldapsynchnow.php Remote Code Execution Exploit This module exploits a vulnerability present in PineApp Mail-SeCure. The specific flaw exists within the component ldapsynchnow.php, which lacks proper sanitization, thus allowing command injection. NOCVE-9999-59234 Exploits/Remote Linux
10.20.2013 TP-Link Camera servetest Command Injection Exploit This module exploits an OS command injection vulnerability in the /cgi-bin/admin/servetest file of several TP-Link surveillance cameras. This vulnerability allows remote authenticated users to execute arbitrary commands on affected cameras. CVE-2013-2578 Exploits/Remote
10.16.2013 Microsoft Windows Win32k NULL Page Vulnerability Exploit (MS13-081) This module exploits a vulnerability in "win32k.sys" by calling to the "TrackPopupMenuEx" function. CVE-2013-3881 Exploits/Local Windows
10.15.2013 TP-Link Camera uploadfile Unauthenticated File Upload Exploit This module exploits an unauthenticated file upload vulnerability on TP-Link IP cameras. Due to improper access restrictions, it is possible for a remote unauthenticated attacker to upload an arbitrary file to the /mnt/mtd directory on the camera by issuing a POST request against the file /cgi-bin/uploadfile. CVE-2013-2580 Exploits/Remote
10.14.2013 Oracle WebLogic Server Apache Connector Exploit Update Exploits a buffer overflow in the Apache Connector of Oracle WebLogic Server (formerly known as BEA WebLogic Server). The target path used when launching this module against an Apache Server must be handled by the Apache Connector or the exploit will not succeed. This update changes the default connection method for the module. CVE-2008-3257 Exploits/Remote Windows, AIX, Linux
10.14.2013 Nginx HTTP Server Chuncked Encoding Buffer Overflow Exploit This module exploits a buffer overflow vulnerability present in Nginx by bypassing the stack cookie protection and by reordering the TCP packets to make it reliable. CVE-2013-2028 Exploits/Remote Linux
10.09.2013 Foscam Camera tmpfs File Disclosure Exploit This module exploits a file disclosure vulnerability on Foscam IP cameras. Due to improper access restrictions, it is possible for a remote unauthenticated attacker to read arbitrary files from the /tmpfs/ and /log/ directories. This can be exploited to obtain valuable information such as access credentials, Wi-Fi configuration and other sensitive information in plain text. CVE-2013-2574 Exploits/Remote
10.09.2013 Foscam Path Traversal Exploit This module exploits a path traversal vulnerability on Foscam IP cameras and commit a camera agent. CVE-2013-2560 Exploits/Remote
10.08.2013 Oracle Java BytePackedRaster Exploit This module exploits a vulnerability in Oracle Java. The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This vulnerability allows for remote code execution. CVE-2013-2463 Exploits/Client Side Windows, Linux
10.06.2013 Oracle Java IntegerInterleavedRaster Signed Integer Overflow Exploit This module exploits a vulnerability in Oracle Java. The vulnerability is an invalid array indexing that exists within the native IntegerInterleavedRaster.verify() function inside jre/bin/awt.dll CVE-2013-2471 Exploits/Client Side Windows, Linux
10.06.2013 Oracle Java storeImageArray Invalid Array Indexing Exploit This module exploits a vulnerability in Oracle Java. The vulnerability is an invalid array indexing that exists within the native storeImageArray() function inside jre/bin/awt.dll. CVE-2013-2465 Exploits/Client Side Windows, Linux
10.06.2013 Microsoft Windows Telephony Service exploit Update This module connects to Telephony Service and sends a message via lineSetAppPriorityW winapi32 producing a buffer overflow and installs an agent. This update fixes a bug that occurs when this module is launched by RPT, with a newer Windows platform such as Windows Seven as target. CVE-2005-0058 Exploits/Local Windows
10.02.2013 Micorosft Internet Explorer SetMouseCapture Use-After-Free Exploit This module exploits a use after free in Internet Explorer by using a SetMouseCapture vulnerability in MSHTML. This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2013-3893 Exploits/Client Side Windows
10.02.2013 Microsoft Internet Explorer SetMouseCapture Use-After-Free Exploit Update This module exploits a use after free in Internet Explorer by using a SetMouseCapture vulnerability in MSHTML. This update fixes a typo in the name of the module. This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2013-3893 Exploits/Client Side Windows
10.01.2013 Openftpd Server Buffer Overflow Exploit Update The vulnerability is caused due to a boundary error within the authentication process. This can be exploited to cause a stack-based buffer overflow by sending an overly long, specially-crafted password to the affected server. This update adds CVE Number. CVE-2010-2620 Exploits/Remote Windows
10.01.2013 CSRSS facename exploit Update 2 This module exploits a stack-based buffer overflow in WINSRV.DLL in the Client Server Runtime System (CSRSS) process. Allows local users to gain privileges via a specially-designed application that provides console window information with a long FaceName value. This update fixes a bug that occurs when this module is launched by RPT, with a newer Windows platform such as Windows Seven as target. CVE-2005-0551 Exploits/Local Windows
09.30.2013 Microsoft Windows Class Name String Atom Privilege Escalation Exploit (MS12-041) An error in the way that the Windows kernel handles string atoms when registering a new window class allows unprivileged users to re-register atoms of privileged applications. This vulnerability can be exploited by local unprivileged users to execute arbitrary code with SYSTEM privileges. CVE-2012-1864 Exploits/Local Windows
09.30.2013 Exim With Dovecot LDA Remote Code Execution Exploit The Dovecot documentation contains an example using a dangerous configuration option for Exim, which leads to a remote command execution vulnerability. NOCVE-9999-59209 Exploits/Remote Linux
09.29.2013 Bifrost Server Buffer Overflow Exploit Bifrost Server is prone to a buffer overflow vulnerability which can be exploited remotely by sending a specially crafted packet to port TCP/81. NOCVE-9999-58713 Exploits/Remote Windows
09.29.2013 Adobe ColdFusion APSB13-03 Remote Code Execution Exploit Adobe ColdFusion is vulnerable to a remote authentication-bypass, allowing the attacker to upload an agent and execute it. The agent may have SYSTEM privileges if ColdFusion is installed as a service in Windows. CVE-2013-0632 Exploits/Remote Windows
09.18.2013 Microsoft Office Access Database Processing Pointers Exploit (MS13-074) Microsoft Access contains a vulnerability in the way it handles compiled queries that are stored in .aacdb files. It mistakenly interprets certain fields in the file as pointers and produce memory corruption. CVE-2013-3155 Exploits/Client Side Windows
09.17.2013 Microsoft Windows Win32k Divided Error Exception DoS (MS13-046) Update This module exploits a Windows kernel vulnerability calling to "NtGdiScaleViewportExtEx" function by using crafted parameters. This update adds support for all 32 bit Windows versions. CVE-2013-1334 Denial of Service/Local Windows
09.15.2013 freeSSHd SSH Server Authentication Bypass Remote Code Execution Exploit Update V2 This update modifies the application version displayed in Quick Information. CVE-2012-6066 Exploits/Remote Windows
09.15.2013 Microsoft Windows Print Spooler Service Format String Vulnerability DoS (MS12-054) Update V3 This update provides a better documentation for this module. CVE-2012-1851 Denial of Service/Remote Windows
09.15.2013 SNMP OS Detect and Identity Verifier Update V2 This update extends the information gathered to include CVE-1999-0516 and CVE-1999-0517 when present in the target. Exploits/Remote
09.15.2013 FreeFTPd PASS Command Buffer Overflow Exploit FreeFTPd is prone to a buffer overflow when handling an overly long PASS command. NOCVE-9999-59669 Exploits/Remote Windows
09.15.2013 Music Animation Machine MIDI SEH Buffer Overflow Exploit Music Animation Machine MIDI Player contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in MAM Player when handling misleading MIDI files. This situation leads to a buffer overflow and allows an attacker to overwrite an SEH Pointer and get control of execution. This vulnerability can be exploited via a specially crafted .mamx file. CVE-2011-0502 Exploits/Client Side Windows
09.15.2013 Firefox XMLSerializer Use After Free Exploit This module exploits a vulnerability in Mozilla Firefox when serializing XML to a DOM object. A certain method used during this process is likely to create a dangling pointer. Remote attackers can take advantage of this memory and use it to execute arbitrary code. CVE-2013-0753 Exploits/Client Side Windows
09.12.2013 Microsoft Windows Theme File Handling Exploit (MS13-071) The vulnerability is caused due to an error when handling theme and screensaver files. CVE-2013-0810 Exploits/Client Side Windows

Pages