CORE Impact Pro Exploits and Security Updates

When you buy CORE Impact Pro, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within CORE Impact Pro. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because CORE Impact Pro keeps you there.

Use the controls below to navigate CORE Impact exploits and other modules.

Released Date Titlesort ascending Description Vulnerabilty Category Platform
10.16.2006 AIX update_flash PATH usage exploit This module exploits a untrusted search path vulnerability in update_flash for IBM AIX. CVE-2006-2647 Exploits/Local AIX
05.28.2009 AIX Setlocale Function Local Privilege Escalation Exploit The AIX Setlocale Function is prone to a local privilege-escalation vulnerability. A local attacker may be able to exploit this issue to gain elevated privileges on the affected computer. A successful exploit will lead to the complete compromise of the affected computer. CVE-2006-4254 Exploits/Local AIX
06.16.2009 AIX Pioout Local Buffer Overflow Privilege Escalation Exploit AIX Pioout is prone to a vulnerability that allows attackers to execute arbitrary code with superuser privileges. This is due to insecure permissions shared libraries. CVE-2007-5764 Exploits/Local AIX
06.22.2009 AIX libtt.a rpc.ttdbserver Buffer Overflow Exploit This module exploits a buffer overflow vulnerability in the ToolTalk library libtt.a. After successful exploitation an agent running as root will be installed on the target machine. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. NOCVE-9999-38844 Exploits/Remote AIX
10.03.2007 AIX Libodm ODMPATH exploit This module exploits a vulnerability in the processing of the ODMPATH environment variable within the odm_searchpath() function. This function reads the ODMPATH variable from the user provided environment, and then copies it into a fixed sized stack buffer without properly validating its length. This results in a stack-based buffer overflow, and allows the saved return address to be overwritten allowing the execution of arbitrary code with root privileges. CVE-2007-3680 Exploits/Local AIX
01.27.2010 AIX rpc.cmsd Buffer Overflow Exploit This module exploits a remote buffer overflow vulnerability on the Calendar Manager Service Daemon. CVE-2009-3699 Exploits/Remote AIX
08.28.2013 Agnitum Outpost Security Suite Privilege Escalation Exploit This module exploits a vulnerability in Agnitum Outpost Security Suite acs.exe service server when handling a specially crafted request, sent to the acsipc_server named pipe. Attackers can leverage this issue to execute arbitrary code with elevated privileges in the context of the acs.exe server process. NOCVE-9999-59314 Exploits/Local Windows
09.13.2011 Agent modules realibility fix This update improves the reliability of the Microsoft Package and Register, Send Agent by Email, Install agent using SMB, Instal agent using USB and Install agent using SSH modules. Exploits/Remote
01.23.2013 Advantech Studio ISSymbol ActiveX Control Buffer Overflow Exploit Update Buffer overflow in the ISSymbol ActiveX control in ISSymbol.ocx in Advantech Studio allow remote attackers to execute arbitrary code via a long String argument in the InternationalOrder method. This verions adds suppport for Internet Explorer 8 and 9 and Windows 7. CVE-2011-0340 Exploits/Client Side Windows
10.25.2012 Advantech Studio ISSymbol ActiveX Control Buffer Overflow Exploit Buffer overflow in the ISSymbol ActiveX control in ISSymbol.ocx in Advantech Studio allow remote attackers to execute arbitrary code via a long String argument in the InternationalOrder method. CVE-2011-0340 Exploits/Client Side Windows
12.02.2010 Advantage Data Architect wfapi DLL Hijacking Exploit Advantage Data Architect is prone to a vulnerability that may allow the execution of any library file named wfapi.dll, if this dll is located in the same folder than a .ADT file. NOCVE-9999-45973 Exploits/Client Side Windows
07.07.2013 Adrenalin Player WAX Buffer Overflow Exploit This module exploits a vulnerability in Adrenalin Player .WAX files. The vulnerability is caused due to lack of boundary checks in exporting a WAX file witch causes an Buffer Overflow of the stack and a SEH attack is possible due to a vulnerable DLL included in the software. NOCVE-9999-58661 Exploits/Client Side Windows
07.10.2013 Adrenalin Player ASX Buffer Overflow Exploit This module exploits a vulnerability in Adrenalin Player .ASX files. The vulnerability is caused due to lack of boundary checks in exporting an ASX file witch causes an Buffer Overflow of the stack and a SEH attack is possible due to a vulnerable DLL included in the software. NOCVE-9999-58660 Exploits/Client Side Windows
10.21.2010 Adobe Shockwave rcsL Buffer Overflow Exploit This module exploits a vulnerability in Adobe Shockwave triggered when processing a specially crafted .DIR file. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2010-2873 Exploits/Client Side Windows
11.16.2009 Adobe RoboHelp Server File Upload Code Execution Exploit This module exploits a remote .JSP code injection in Adobe RoboHelp Server by sending a specially crafted HTTP request to the affected service. CVE-2009-3068 Exploits/Remote Windows
06.24.2014 Adobe Reader X XFA BMP RLE Heap Corruption Exploit This module exploits a heap based buffer overflow vulnerability in Adobe Reader X when handling a specially crafted PDF file. CVE-2013-2729 Exploits/Client Side Windows
12.12.2011 Adobe Reader U3D Memory Corruption Exploit The vulnerability is a memory corruption in the U3D component in Adobe Reader when handling a specially crafted PDF file. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2011-2462 Exploits/Client Side Windows
01.16.2014 Adobe Reader ToolButton Use-After-Free Exploit Update This module exploits a Use-After-Free vulnerability in Adobe Reader when handling a specially crafted PDF file. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. This update adds Javascript obfuscation to the PDF document and fixes some documentation issues. CVE-2013-3346 Exploits/Client Side Windows
12.10.2013 Adobe Reader ToolButton Use-After-Free Exploit This module exploits a Use-After-Free vulnerability in Adobe Reader when handling a specially crafted PDF file. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2013-3346 Exploits/Client Side Windows
11.06.2008 Adobe Reader printf Buffer Overflow Exploit Update The vulnerability is caused due to a boundary error when parsing format strings containing a floating point specifier in the util.printf() JavaScript function. This update improves exploit reliability and fixes a cookie handling bug. CVE-2008-2992 Exploits/Client Side Windows
11.03.2008 Adobe Reader printf Buffer Overflow Exploit The vulnerability is caused due to a boundary error when parsing format strings containing a floating point specifier in the util.printf() JavaScript function. CVE-2008-2992 Exploits/Client Side Windows
08.11.2009 Adobe Reader JBIG2Decode Memory Corruption Exploit update This module exploits an array indexing vulnerability in Adobe Reader when handling a specially crafted PDF file. This update adds support for Windows XP SP2, Windows 2000 Professional SP4 and improves reliability when exploiting from browsers. CVE-2009-0658 Exploits/Client Side Windows
02.23.2009 Adobe Reader JBIG2Decode Memory Corruption Exploit This module exploits an array indexing vulnerability in Adobe Reader when handling a specially crafted PDF file. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2009-0658 Exploits/Client Side Windows
03.04.2010 Adobe Reader Import Tiff Buffer Overflow Exploit Update This module exploits a buffer overflow vulnerability in Adobe Reader products when a malformed .TIFF file is parsed. This update add support for Windows Vista and Windows 7 trying to bypass DEP and ASRL protections. CVE-2010-0188 Exploits/Client Side Windows
02.23.2010 Adobe Reader Import Tiff Buffer Overflow Exploit This module exploits a buffer overflow vulnerability in Adobe Reader products when a malformed .TIFF file is parsed. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2010-0188 Exploits/Client Side Windows
01.22.2012 Adobe Reader ICC Chunk Parsing Integer Overflow Exploit An integer overflow occurs when Adobe Reader parses some crafted ICC chunks. CVE-2011-2097 Exploits/Client Side Windows
04.18.2012 Adobe Reader Font SING Table Buffer Overflow Exploit Update This update fixes an error which made the module abort. CVE-2010-2883 Exploits/Client Side Windows
01.25.2011 Adobe Reader Font SING Table Buffer Overflow Exploit Adobe Acrobat and Reader have a buffer overflow error in the "CoolType.dll" module when processing a .PDF document containing an overly long field in a SING (Smart Independent Glyphlets) table within a TrueType font. CVE-2010-2883 Exploits/Client Side Windows
09.19.2010 Adobe Reader Font Parsing Exploit Update This module exploits a vulnerability in Adobe Reader when parsing a .PDF file with a malformed font embedded. This update adds support for several versions of Adobe Reader and corrects the CVE Number of the vulnerability. CVE-2010-2883 Exploits/Client Side Windows
09.07.2010 Adobe Reader Font Parsing Exploit This module exploits a vulnerability in Adobe Reader when parsing a .PDF file with a malformed font embedded. WARNING: This is an early release module.This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2010-2883 Exploits/Client Side Windows

Pages