Core Impact Pro Exploits and Security Updates

When you buy Core Impact Pro, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact Pro. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact Pro keeps you there.

Use the controls below to navigate Core Impact exploits and other modules.

Released Datesort ascending Title Description Vulnerabilty Category Platform
04.16.2009 Microsoft WordPad Word97 Converter Stack Overflow Exploit (MS09-010) This module exploits a stack based buffer overflow vulnerability in WordPad when handling a specially crafted Word97 file. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2009-0235 Exploits/Client Side Windows
04.13.2009 OpenSite 2.1 Weak Authentication Exploit This module exploits an authentication vulnerability in OpenSite 2.1. The function init in origin/libs/user.php checks for a matching origin_hash cookie. However, this cookie can be bruteforced in at most 2^32 tries for a known username. Actually, the number of attempts could be significantly reduced knowing that we do not have to check for time in the future, and long past. This works for OpenSite 2.1 and below. NOCVE-9999-36572 Exploits/Authentication Weakness
04.12.2009 PeerCast HTTP Server Buffer Overflow exploit PeerCast is prone to a remote buffer overflow vulnerability. This can facilitate a remote compromise due to arbitrary code execution. CVE-2006-1148 Exploits/Remote Linux
04.12.2009 eZip Wizard Buffer Overflow Exploit A stack-based buffer overflow in eZip Wizard allows an attacker to execute arbitrary code via a crafted zip file with a long name of the internal file. CVE-2009-1028 Exploits/Client Side Windows
04.12.2009 pPim Remote File Inclusion Exploit This module exploits a vulnerability in pPIM's upload.php script that allows attackers to upload arbitrary scripts of any type to the target server. NOCVE-9999-36557 Exploits/Remote File Inclusion/Known Vulnerabilities
04.12.2009 Adobe PDF getIcon Buffer Overflow Exploit Update This module exploits a stack based buffer overflow vulnerability in Adobe Reader when handling a specially crafted PDF file. This update adds support for Adobe Acrobat Pro Extended 9. CVE-2009-0927 Exploits/Client Side Windows
04.07.2009 Maya Studio EO Video Playlist Buffer Overflow Exploit Maya Studio EO-Video is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input when handling playlist files. CVE-2008-3733 Exploits/Client Side Windows
04.07.2009 Microsoft Windows NtGdiFastPolyPolyline memory corruption DoS (MS09-006) This module exploits a kernel memory corruption on NtGdiFastPolyPolyline function via a malformed EMF file. CVE-2009-0081 Denial of Service/Client Side Windows
04.06.2009 Foxit Reader Open File Buffer Overflow Exploit Update This module exploits a buffer overflow vulnerability in Foxit Reader. If an Open/Execute a file action is defined in the PDF file with an overly long file name argument, when the trigger condition is satisfied it will cause a stack-based buffer overflow, because the application tries to copy the file name argument to a fixed-size buffer in the stack without properly checking that the buffer is large enough to hold the file name string. This update adds support for Windows Vista and Windows Server 2003. CVE-2009-0837 Exploits/Client Side Windows
04.05.2009 POP Peeper UIDL Buffer Overflow Exploit The POP Peeper client is vulnerable to a remote buffer overflow vulnerability. This vulnerability is exploitable as a client side attack. A vulnerable POP Peeper user must connect to a server created by IMPACT Pro and attempt to retrieve mail in order for IMPACT Pro to exploit the vulnerable agent and deploy and agent on the users machine. NOCVE-9999-36822 Exploits/Client Side Windows
04.05.2009 FreeBSD Kernel Protosw Privilege Escalation Exploit The FreeBSD kernel provides support for a variety of different types of communications sockets, including IPv4, IPv6, ISDN, ATM, routing protocol, link-layer, netgraph(4), and bluetooth sockets. Some function pointers for netgraph and bluetooth sockets are not properly initialized. This can be exploited to e.g. read or write to arbitrary kernel memory via a specially crafted "socket()" system call, and allows an unprivileged process to elevate privileges to root or escape a FreeBSD jail. CVE-2008-5736 Exploits/Local FreeBSD
03.30.2009 Anti Keylogger Elite Privilege Escalation Exploit This module exploits a vulnerability in Anti keylogger elite when the 0x002224A4 function is invoked with a specially crafted parameter. The IOCTL 0x002224A4 handler in the AKEProtect.sys device driver in Anti Keylogger Elite allows local users to overwrite memory and execute arbitrary code via malformed Interrupt Request Packet (Irp) parameters to obtain system privileges. CVE-2008-5049 Exploits/Local Windows
03.29.2009 Adobe PDF getIcon Buffer Overflow Exploit This module exploits a stack based buffer overflow vulnerability in Adobe Reader when handling a specially crafted PDF file. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2009-0927 Exploits/Client Side Windows
03.26.2009 Oracle Secure Backup NDMP_CONNECT_CLIENT_AUTH Buffer Overflow Exploit This module exploits a vulnerability in Oracle Secure Backup when sending a specially crafted NDMP_CONNECT_CLIENT_AUTH packet. CVE-2008-5444 Exploits/Remote Windows
03.25.2009 Orbit Downloader Connecting Log Message Buffer Overflow Exploit The application is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Specifically, this issue occurs when the application creates a 'Connecting' log message. An attacker can exploit this issue by enticing a vulnerable user into connecting to a malicious HTTP server or opening a specially crafted URI that contains an excessively long hostname. CVE-2009-0187 Exploits/Client Side Windows
03.25.2009 Moodle Tex Filter Remote Code Execution Exploit Upgrade This update adds Windows (XP) to the supported target systems for this exploit. NOCVE-9999-35969 Exploits/Remote Windows, Linux
03.17.2009 WinGate Proxy Server Buffer Overflow Exploit The vulnerability is caused due to a boundary error within the handling of POST requests. This may allow execution of arbitrary code by sending an overly long, specially crafted POST request to the proxy server CVE-2006-2926 Exploits/Remote Windows
03.16.2009 WebApps Cross-Site Scripting v8.0 rev 1 This package updates WebApps' Cross-Site Scripting features to improve accuracy of detection and reporting of vulnerabilities. Exploits/Cross Site Scripting (XSS)
03.11.2009 Microsoft IE CFunctionPointer Memory Corruption Exploit Update This module exploits a memory corruption vulnerability when Internet Explorer attempts to access an object that has been deleted. This update adds support for Windows Vista SP0 and SP1. CVE-2009-0075 Exploits/Client Side Windows
03.10.2009 XM Easy Personal FTP Server DoS XM Easy Personal FTP Server is prone to multiple remote denial-of- service vulnerabilities because it fails to properly handle user-supplied input. CVE-2006-2225 Denial of Service/Remote Windows
03.08.2009 Foxit Reader Open File Buffer Overflow Exploit This module exploits a buffer overflow vulnerability in Foxit Reader. If an Open/Execute a file action is defined in the PDF file with an overly long file name argument, when the trigger condition is satisfied it will cause a stack-based buffer overflow, because the application tries to copy the file name argument to a fixed-size buffer in the stack without properly checking that the buffer is large enough to hold the file name string. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. NOCVE-9999-36556 Exploits/Client Side Windows
03.08.2009 Client information - email webbug registration in webserver fix This update changes the way email webbug module registers its prefix with the webserver module. Exploits/Client Side
03.05.2009 Euphonics Audio Player PLS Buffer Overflow Exploit Euphonics Audio Player contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error when handling .PLS files. NOCVE-9999-35967 Exploits/Client Side Windows
03.05.2009 Symantec AppStream LaunchObj ActiveX Exploit This module exploits an arbitrary file download and execute vulnerability in the LaunchObj ActiveX Control included in Symantec AppStream Client. CVE-2008-4388 Exploits/Client Side Windows
03.05.2009 Sami FTP Server Authentication Buffer Overflow Exploit The vulnerability is caused due to a boundary error within the authentication process. This can be exploited to cause a stack-based buffer overflow by sending an overly long, specially-crafted password to the affected server and waiting for the administrator of Sami FTP Server to set focus on the GUI of the program in order to deploy an agent. CVE-2006-2212 Exploits/Remote Windows
03.03.2009 BlazeHDTV PLF Playlist Buffer Overflow Exploit This module exploits a vulnerability caused due to a boundary error in BlazeHDTV when handling Playlist files. This can be exploited to cause a stack-based buffer overflow via a specially crafted PLF file. CVE-2006-6396 Exploits/Client Side Windows
03.03.2009 WebApps Exploit Generator Update v8.0 rev 1 Update solving a conflict between new XSS Exploits and XSS Exploit Generator Exploits/Cross Site Scripting (XSS)
03.02.2009 Free Download Manager Torrent Parsing Buffer Overflow Exploit This module exploits a vulnerability in Free Download Manager. The vulnerability is caused due to a boundary error within the processing of torrent files. This can be exploited to cause a stack-based buffer overflow when a specially crafted file is opened. CVE-2009-0184 Exploits/Client Side Windows
03.01.2009 Typo3 Cross Site Scripting Exploit This module exploits insecure randomness vulnerability in Typo3, which leads to XSS attacks. This module tries to guess the Typo3 encryptionKey by exploiting its insecure randomness. If guessed, it will install an XSS Agent. Exploits/Cross Site Scripting (XSS)/Known Vulnerabilities
02.27.2009 Chilkat ActiveX Remote Code Execution Exploit This module exploits a Remote Arbitrary File Creation/Execution vulnerability in the AppendBinary and SaveToFile function in Chilkat to deploy an agent. CVE-2008-5002 Exploits/Client Side Windows

Pages