Core Impact Pro Exploits and Security Updates

When you buy Core Impact Pro, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact Pro. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact Pro keeps you there.

Use the controls below to navigate Core Impact exploits and other modules.

Released Date Titlesort descending Description Vulnerabilty Category Platform
08.06.2009 PulseAudio Privilege Escalation Exploit This module exploits a race condition vulnerability in PulseAudio on Linux systems to gain elevated privileges. CVE-2009-1894 Exploits/Local Linux
10.02.2014 PureFTPd Bash Variables Injection Exploit (CVE-2014-6271) This update includes a module exploiting a vulnerability found in Bash. When using PureFTPd in conjuntion with the vulnerable Bash version for user authentication, a Core Impact agent is installed. CVE-2014-6271 Exploits/Remote Solaris, Linux
06.11.2015 QEMU Floppy Disk Controller fdctrl_handle_drive_specification_command Virtual Machine Escape Exploit (VENOM) The fdctrl_handle_drive_specification_command() function in the code that emulates the Floppy Disk Controller in QEMU does not properly reset the index within a buffer when processing user-controlled data, leading to a heap-based buffer overflow in the QEMU process that runs on the Host system. An attacker running code within a Guest operating system can exploit this vulnerability in order to escape from the QEMU virtual machine and execute arbitrary code on the Host operating system. CVE-2015-3456 Exploits/Local Linux
08.11.2015 QEMU Floppy Disk Controller fdctrl_handle_drive_specification_command Virtual Machine Escape Exploit (VENOM) Update The fdctrl_handle_drive_specification_command() function in the code that emulates the Floppy Disk Controller in QEMU does not properly reset the index within a buffer when processing user-controlled data, leading to a heap-based buffer overflow in the QEMU process that runs on the Host system. An attacker running code within a Guest operating system can exploit this vulnerability in order to escape from the QEMU virtual machine and execute arbitrary code on the Host operating system. This update adds support for exploiting 64-bit guest systems. CVE-2015-3456 Exploits/Local Linux
08.03.2010 QQPlayer File Processing Buffer Overflow Exploit QQPlayer contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in QQPlayer when handling .ASX files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .ASX file. NOCVE-9999-44532 Exploits/Client Side Windows
05.10.2012 Quest InTrust AnnotateX ActiveX Exploit A vulnerability exists in AnnotateX.dll - by invoking the Add() method it is possible to call inside of any memory region of choice as selected by an attacker. NOCVE-9999-51883 Exploits/Client Side Windows
02.28.2011 Quick n Easy FTP Server Login DoS This module shuts down the Quick 'n Easy FTP Server because it fails to properly handle user-supplied malformed packets when login. CVE-2009-1602 Exploits/Remote Windows
02.07.2011 Quick TFTP Server Pro Mode Remote Buffer Overflow Exploit This module exploits a buffer overflow vulnerability in Quick TFTP Server Pro when processing a very large mode field in a read or write request. CVE-2008-1610 Exploits/Remote Windows
12.05.2010 QuickBooks Pro 2010 dbicudtx10 DLL Hijacking Exploit QuickBooks Pro 2010 is prone to a vulnerability that may allow the execution of any library file named dbicudtx10.dll, if this dll is located in the same folder than a .QPG file. NOCVE-9999-46110 Exploits/Client Side Windows
03.28.2006 QuickTime JPEG Exploit This module exploits a vulnerability in Apple QuickTime PictureViewer and installs an agent. CVE-2005-2340 Exploits/Client Side Windows
10.02.2006 QuickTime JPEG Exploit Update This module exploits a vulnerability in Apple QuickTime PictureViewer and installs an agent. This update adds support for Mac OS X CVE-2005-2340 Exploits/Client Side Windows
10.18.2006 QuickTime JPEG Exploit Update 2 This module exploits a vulnerability in Apple QuickTime PictureViewer and installs an agent. This update improve the exploit reliability in Mac OS X. CVE-2005-2340 Exploits/Client Side Windows
08.10.2010 QuickTime Player Streaming Debug Error Logging Buffer Overflow Exploit The vulnerability is caused due to a boundary error in QuickTimeStreaming.qtx when constructing a string to write to a debug log file. This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into viewing a specially crafted web page that references a SMIL file containing an overly long URL. CVE-2010-1799 Exploits/Client Side Windows
08.22.2010 QuickTime Player Streaming Debug Error Logging Buffer Overflow Exploit Update A stack buffer overflow exists in QuickTime's error logging. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This update embed the .MOV file in Internet Explorer 6 or 7, in other browsers it can be downloaded for use and exploitation in QuickTime. It also add support for Windows Vista. CVE-2010-1799 Exploits/Client Side Windows
11.27.2007 QuickTime RTSP Content-Type exploit This module runs a server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting a vulnerability in Apple QuickTime, which allows unauthenticated attackers to execute arbitrary code or cause a denial of service condition. CVE-2007-6166 Exploits/Client Side Windows, Mac OS X
12.19.2007 QuickTime RTSP Content-Type exploit Mac Intel update This module runs a server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting a vulnerability in Apple QuickTime, which allows unauthenticated attackers to execute arbitrary code or cause a denial of service condition. This update adds Mac Intel support. CVE-2007-6166 Exploits/Client Side Windows, Mac OS X
11.29.2007 QuickTime RTSP Content-Type exploit update This module runs a server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting a vulnerability in Apple QuickTime, which allows unauthenticated attackers to execute arbitrary code or cause a denial of service condition. This updates adds Vista as a supported platform for Quicktime 7.3 and also targets Quicktime version 7.2 in both Windows XP and Windows Vista. CVE-2007-6166 Exploits/Client Side Windows, Mac OS X
02.06.2007 QuickTime RTSP URL exploit This exploit triggers a stack-based buffer overflow in the QuickTime browser plugin via a specially crafted HTML page. CVE-2007-0015 Exploits/Client Side Windows
05.27.2014 QuickView Plus Client vsacs Buffer Overflow Exploit Quick View Plus contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in Quick View Plus when handling .MDB files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .MDB file. This module runs a malicious web server on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to it by opening the crafted MDB file with Quick View Plus. CVE-2013-5791 Exploits/Client Side Windows
11.30.2009 Quiksoft EasyMail AddAttachment Method ActiveX Control Buffer Overflow Exploit QuikSoft EasyMail is prone to a buffer overflow. The vulnerability affects the 'AddAttachment()' method of the 'emsmtp.dll'. The issue occurs when the method handles user-input buffer with overly long size. CVE-2009-4663 Exploits/Client Side Windows
06.11.2012 RabidHamster R4 Log Entry sprintf Buffer Overflow Exploit A stack overflow found in RabidHamster R4's web server by supplying a malformed HTTP request when generating a log. NOCVE-9999-52541 Exploits/Remote Windows
12.04.2008 RadAsm WindowCallProcA Pointer Hijack Exploit The vulnerability is caused due to a boundary error in the processing of .RAP files. This can be exploited to cause a stack-based buffer overflow by tricking a user into decoding a specially crafted .RAP file. CVE-2000-0079 Exploits/Client Side
08.27.2009 RadAsm WindowCallProcA Pointer Hijack Exploit Update The vulnerability is caused due to a boundary error in the processing of .RAP files. This can be exploited to cause a stack-based buffer overflow by tricking a user into decoding a specially crafted .RAP file. This update modifies the current NOCVE for the module and adds support for the new Impact 9 Client Side features. NOCVE-9999-39682 Exploits/Client Side Windows
04.29.2009 RainbowPlayer RPL Buffer Overflow Exploit RainbowPlayer is prone to a remote buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. NOCVE-9999-37090 Exploits/Client Side Windows
02.17.2011 Real Networks RealPlayer SP RecordClip Exploit This module exploits an arbitrary file download vulnerability in the RecordingManager Control included in RealPlayer SP. CVE-2010-3749 Exploits/Client Side Windows
07.28.2010 Real Player MS HelpCenter Command Execution Exploit (MS10-042) This module exploits a vulnerability caused due to an error in the MPC::HTML::UrlUnescapeW() function in helpctr.exe when escaping URLs, add direct exploitation from Real Player to the original Internet Explorer attack vector. CVE-2010-1885 Exploits/Client Side Windows
04.26.2011 RealNetworks Arcade Games ActiveX Control Exploit This module runs a web server waiting for vulnerable clients (Internet Explorer with a vulnerable StubbyUtil.InstallerDlg.1 ActiveX Control) to connect to it. When the client connects, it will try to install an agent by sending a specially crafted HTML page which exploits the Real Networks Arcade Game's ActiveX control. ActiveX Control Remote Code Execution Vulnerability. Ref: http://www.exploit-db.com/exploits/17149/ NOCVE-9999-47971 Exploits/Client Side Windows
02.19.2009 RealNetworks Helix DNA Server Remote Heap Overflow Exploit This module exploits a remote heap overflow in the Helix DNA Server (rmserver.exe) by sending a specially crafted RTSP packet to the 554/TCP port. CVE-2008-5911 Exploits/Remote Windows
05.04.2010 RealNetworks Helix Server AgentX Remote Buffer Overflow Exploit This module exploits a remote stack-based buffer overflow vulnerability in AgentX++, as distributed with Helix Server, by sending multiple blocks of data to the port 705/TCP. CVE-2010-1318 Exploits/Remote Windows
04.05.2011 RealNetworks RealPlayer CDDA URI ActiveX Exploit An ActiveX control in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.4, and RealPlayer Enterprise 2.1.2 does not properly initialize an unspecified object component during parsing of a CDDA URI, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer dereference and application crash) via a long URI. CVE-2010-3747 Exploits/Client Side Windows

Pages