Core Impact Pro Exploits and Security Updates

When you buy Core Impact Pro, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact Pro. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact Pro keeps you there.

Use the controls below to navigate Core Impact exploits and other modules.

Released Date Titlesort descending Description Vulnerabilty Category Platform
12.17.2013 RealPlayer TRACKID tag handling RMP Buffer Overflow Exploit Real Media Player are vulnerable to a heap buffer overflow when provided with a specially crafted .rmp file with malformed TRACKID tags. CVE-2013-6877 Exploits/Client Side Windows
12.16.2008 Realtek Media Player Playlist Buffer Overflow Exploit Realtek Media Player contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error when handling .PLA files. NOCVE-9999-0139 Exploits/Client Side
06.08.2006 RealVNC 4.1.1 Authentication Exploit This exploit simulates a RealVNC client and establishes a connection with a Real VNC server without using a password. After that, it opens a console, writes the exploit and executes it in ntsd.exe CVE-2006-2369 Exploits/Remote Windows
05.28.2006 RealVNC 4.1.1 Authentication Exploit Proxy This exploit proxies TCP connections to a remote (or local) VNC server and monitors the list of supported authentication methods of the server. Connecting clients will receive a dummy list consisting of only one authentication method (no password). CVE-2006-2369 Exploits/Tools Windows
11.24.2008 RealVNC 4.1.1 Authentication Exploit Update This exploit simulates a RealVNC client and establishes a connection with a Real VNC server without using a password. After that, it opens a console, writes the exploit and executes it in ntsd.exe CVE-2006-2369 Exploits/Remote Windows
03.07.2010 ReGet Deluxe WJR File Buffer Overflow Exploit The vulnerability is caused due to a boundary error in the processing of .WJR files. This can be exploited to cause a stack-based buffer overflow by tricking the user into opening a .WJR file containing an overly long "Save To" field. NOCVE-9999-42326 Exploits/Client Side Windows
12.09.2012 Remote Exploits File Header Update This update only modifies the description in the file header. CVE-2008-1914 Exploits/Remote Windows
09.02.2009 Remote Exploits Invalid Characters Update This update corrects a typo defining invalid characters for the egg in some remote exploits, and improves the reliability of Now SMS MMS Gateway Web Authorization Buffer Overflow Exploit on Windows 2000 targets. CVE-2007-4440 Exploits/Remote Windows
05.06.2010 Remote Exploits Service Package Update This package specify the service to be attacked, taking the info from services.py. CVE-2008-4038 Exploits/Remote Windows, Mac OS X
11.06.2011 Remote Network Interface Performance Enhancements v12 Rev 1 Added some performance enhancements for the Remote Network Interface module. Post Exploitation
05.06.2010 RemoteExec REC File Buffer Overflow Exploit The vulnerability is caused due to a boundary error when processing RemoteExec Computers List files. This can be exploited to cause a stack-based buffer overflow via a ".rec" file having an overly long line. NOCVE-9999-42614 Exploits/Client Side Windows
08.26.2012 Ricoh DC DL-10 SR10 FTP USER Command Buffer Overflow Exploit Ricoh DC's DL-10 SR10 FTP Server is prone to a buffer-overflow vulnerability when handling data through the USER command. This can be exploited by supplying a long string of data to the affected command. NOCVE-9999-53623 Exploits/Remote Windows
05.06.2009 Rosoft Media Player M3U Buffer Overflow Exploit Update Rosoft Media Player is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input of M3U files. This update adds support till the last version of the program.(4.2.1 and 4.3.1) CVE-2007-6478 Exploits/Client Side Windows
03.05.2008 Rosoft Media Player M3U Stack-Based Buffer Overflow Exploit Rosoft Media Player is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input of M3U files. CVE-2007-6478 Exploits/Client Side Windows
08.14.2011 RPT exploits ordering improvements With this update, RPT will prioritize newer exploits when attacking a target. CVE-2011-1567 Exploits/Remote Windows, AIX, Linux, Mac OS X, Solaris, FreeBSD
08.05.2009 RPT Remote Exploits Timeout Update This update corrects timeouts in different remote exploits. CVE-2007-6377 Exploits/Remote Windows
08.27.2007 RSH Daemon for Windows Remote Buffer Overflow Exploit This module exploits a stack-based buffer overflow vulnerability in the Windows RSH application (rshd.exe). The module sends a specially crafted packet to port 514/tcp and installs an agent if successful. CVE-2007-4005 Exploits/Remote Windows
12.08.2008 SAdminD Buffer Overflow Exploit This modules exploits a stack buffer overflow of the sadmind daemon, and installs an agent as root. CVE-2008-4556 Exploits/Remote Solaris
02.25.2010 SAdminD Buffer Overflow Exploit Update This modules exploits a stack buffer overflow of the sadmind daemon, and installs an agent as root. This update fix an issue when the module is launched from the Network Attack and Penetration Wizard. CVE-2008-4556 Exploits/Remote Solaris
01.10.2012 Safari File Policy Exploit A policy issue existed in Apple Safari before 5.1 when handling of file:// URLs. CVE-2011-3230 Exploits/Client Side Mac OS X
08.02.2011 Safari Webkit SVG Memory Corruption Exploit Webkit, as used in Apple Safari before 5.06 is prone to a memory corruption vulnerability caused by a web site with a crafted SVG graphic. This allows remote attackers to execute arbitrary code. CVE-2011-1453 Exploits/Client Side Windows
08.03.2009 Safenet SoftRemote IKE Service Remote Buffer Overflow Exploit This module exploits a remote stack-based buffer overflow in the Safenet IKE Service (included in several VPN clients) by sending a specially crafted packet to UDP port 62514. CVE-2009-1943 Exploits/Remote Windows
11.23.2009 SafeNet SoftRemote Policy File Buffer Overflow Exploit The vulnerability is caused due to a boundary error when processing certain sections of .SPD (policy) files. Passing an overly long string to either "TREENAME" or "GROUPNAME" CVE-2009-3861 Exploits/Client Side Windows
08.13.2012 Samba LsarSetInformationPolicy Request Remote Buffer Overflow Exploit This module exploits a heap overflow bug in Samba Server by sending a crafted request packet via DCERPC call. CVE-2012-1182 Exploits/Remote Linux
10.14.2012 Samba LsarSetInformationPolicy Request Remote Buffer Overflow Exploit Update This update adds support to Debian 6.0.0 and adds support for attacking IPv6 targets. This module exploits a heap overflow bug in Samba Server by sending a crafted request packet via DCERPC call. CVE-2012-1182 Exploits/Remote Linux
11.21.2012 Samba LsarSetInformationPolicy Request Remote Buffer Overflow Exploit Update 2 This module exploits a heap overflow vulnerability in Samba Server by sending a crafted request packet via DCERPC call. This update adds support to Debian 5 (32 bits and 64 bits). CVE-2012-1182 Exploits/Remote Linux
06.13.2007 Samba lsa_io_trans_names buffer overflow exploit This module exploits a buffer overflow vulnerability when parsing RPC requests through the LSA RPC interface in Samba 3.x. The exploit is triggered by sending a specially crafted RPC LsarLookupSids request to a vulnerable computer. CVE-2007-2446 Exploits/Remote Solaris, Linux
06.26.2008 Samba nttrans Exploit Update This update improves reliability on Solaris. CVE-2003-0085 Exploits/Remote Solaris, Linux
10.24.2011 Samba Username Map Script Command Injection Exploit The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the SamrChangePassword function, when the "username map script" smb.conf option is enabled. CVE-2007-2447 Exploits/Remote Linux
06.05.2012 Samba Username Map Script Command Injection Exploit Update The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the SamrChangePassword function, when the "username map script" smb.conf option is enabled. This update adds Solaris support. CVE-2007-2447 Exploits/Remote Solaris, Linux

Pages