Core Impact Pro Exploits and Security Updates

When you buy Core Impact Pro, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact Pro. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact Pro keeps you there.

Use the controls below to navigate Core Impact exploits and other modules.

Released Date Titlesort descending Description Vulnerabilty Category Platform
01.04.2011 win32api update Update for win32api module which adds 2 new wrappers. Exploits/Local
01.31.2006 Winamp Computer Name Handling Buffer Overflow Exploit This module exploits a vulnerability in Winamp 5.12 WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. This update can be downloaded and installed by selecting 'Modules' -> 'Update modules' from IMPACT's main menu. A workspace must be opened for the operation to succeed. CVE-2006-0476 Exploits/Client Side Windows
09.22.2009 Winamp Computer Name Handling Buffer Overflow Exploit Update This module exploits a vulnerability in Winamp 5.12. This Update adds support for Impact v9 and Windows XP SP3. CVE-2006-0476 Exploits/Client Side Windows
09.27.2010 Winamp dwmapi DLL Hijacking Exploit Winamp is prone to a vulnerability that may allow execution of dwmapi.dll if this dll is located in the same folder than .CDA file. NOCVE-9999-44965 Exploits/Client Side Windows
07.02.2009 Winamp gen_ff DLL Buffer Overflow Exploit Winamp is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. CVE-2009-1831 Exploits/Client Side Windows
09.23.2009 Winamp gen_ff DLL Buffer Overflow Exploit Update Winamp is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. This update enhances support for the Impact 9. CVE-2009-1831 Exploits/Client Side Windows
03.17.2010 Winamp Impulse Tracker Sample Parsing Buffer Overflow Exploit The vulnerability is caused by a boundary error in the Module Decoder Plug-in (IN_MOD.DLL) when parsing samples and can be exploited to cause a heap-based buffer overflow via a specially crafted Impulse Tracker file. CVE-2009-3995 Exploits/Client Side Windows
01.03.2011 Winamp in_midi DLL MIDI Timestamp Buffer Overflow Exploit Winamp is prone to a buffer-overflow vulnerability that occurs because it fails to perform adequate boundary checks on user-supplied data via a crafted .MID file. CVE-2010-4370 Exploits/Client Side Windows
06.13.2010 Winamp MP4 Processing Integer Overflow Exploit An integer overflow error exists in the processing of MP4 files. This can be exploited to cause a heap-based buffer overflow via e.g. an MP4 file containing a specially crafted "ctts" box. NOCVE-9999-43620 Exploits/Client Side Windows
01.24.2008 Winamp Ultravox Streaming Buffer Overflow Exploit This module exploits a vulnerability in Winamp Player when parsing the Ultravox Streaming metadata. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. CVE-2008-0065 Exploits/Client Side Windows
10.02.2011 WinComLPD Remote Administration Buffer Overflow Exploit A buffer overflow in WinComLPD is triggered by sending an overly long authentication packet to the remote administration service. CVE-2008-5159 Exploits/Remote Windows
04.16.2008 Windows .ANI file parsing Exploit Update An integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .BMP, .CUR, .ICO or .ANI file with a large image size field. You can force vulnerable clients to connect to the web server automatically by using this module to send them a specially designed e-mail to exploit this vulnerability by open it with Outlook or Outlook Express. When the victim reads the HTML message a .ANI file is requested to the exploit's web server. If the system is vulnerable an agent is installed exploiting a buffer overflow in the function that parses such file. CVE-2004-1049 Exploits/Client Side Windows
01.03.2006 Windows .WMF file parsing exploit This module exploits a vulnerability in the way WMF metafile images are handled by Microsoft Window's graphic rendering engine. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. This update can be downloaded and installed by selecting 'Modules' -> 'Update modules' from IMPACT's main menu. A workspace must be opened for the operation to succeed. CVE-2005-4560 Exploits/Client Side Windows
02.26.2006 Windows .WMF file parsing exploit update This module exploits a vulnerability in the way WMF metafile images are handled by Microsoft Windows Graphics Rendering Engine. In this new version, the generated metafile is much more random and fully compliant with the file format. Additionally, the payload tries to escape to another process, then returns from the callback transferring the execution flow back to the host application, hiding exploitation from the user's perception. Note that the exploit will be moved to the Exploits/Client Side category after applying this update. CVE-2005-4560 Exploits/Client Side Windows
04.02.2007 Windows Animated Cursor Buffer Overflow Exploit A remote code execution vulnerability exists in the way that Windows handles cursor, animated cursor, and icon formats. An attacker could try to exploit the vulnerability by constructing a malicious cursor or icon file that could potentially allow remote code execution if a user visited a malicious Web site or viewed a specially crafted e-mail message (MS07-017) CVE-2007-0038 Exploits/Client Side Windows
12.05.2007 Windows Animated Cursor Buffer Overflow Exploit Update A remote code execution vulnerability exists in the way that Windows handles cursor, animated cursor, and icon formats. An attacker could try to exploit the vulnerability by constructing a malicious cursor or icon file that could potentially allow remote code execution if a user visited a malicious Web site or viewed a specially crafted e-mail message (MS07-017). This update adds support for default installs of Windows XP from sp0 to sp2, Windows Vista and Windows 2003 from sp0 to sp2. CVE-2007-0038 Exploits/Client Side Windows
09.28.2009 Windows Debugging Subsystem Exploit Update There is an authentication vulnerability in the Windows debugging subsystem (smss). This allows any user to obtain a handle with any access of any process running. With this handle an agent is injected in a SYSTEM process. The update fixes an issue using Import * CVE-2002-0367 Exploits/Local Windows
07.23.2008 Windows I2O Utility Filter Driver Privilege Escalation Exploit This module exploits a vulnerability in Windows I2O Utility Filter Driver when the 0x222F80 IOCTL in i2omgmt.sys is invoked with a specially crafted parameter. The IOCTL 0x222F80 handler in the i2omgmt.sys device driver in Windows I2O Utility Filter Driver allows local users to overwrite memory and execute arbitrary code via malformed Interrupt Request Packet (IRP) parameters. CVE-2008-0322 Exploits/Local Windows
03.20.2006 Windows ICC buffer overflow exploit This module exploits a buffer overflow in the Microsoft Color Management Module via a jpeg image with crafted ICC profile format tags and installs an agent. CVE-2005-1219 Exploits/Client Side Windows
04.09.2006 Windows ICC buffer overflow exploit update This module exploits a buffer overflow in the Microsoft Color Management Module via a jpeg image with crafted ICC profile format tags and installs an agent. This update adds support for browser URL redirection. CVE-2005-1219 Exploits/Client Side Windows
10.03.2006 Windows IE Webview Setslice exploit This module exploits a buffer overflow in WebViewFolderIcon ActiveX control of Microsoft Internet Explorer and installs an agent. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2006-3730 Exploits/Client Side Windows
10.08.2006 Windows IE Webview Setslice exploit update This module exploits a buffer overflow in WebViewFolderIcon ActiveX control of Microsoft Internet Explorer and installs an agent. This update adds support for more platforms. CVE-2006-3730 Exploits/Client Side Windows
10.22.2006 Windows IE Webview Setslice exploit update 2 This module exploits a buffer overflow in WebViewFolderIcon ActiveX control of Microsoft Internet Explorer and installs an agent. This update fixes a bug introduced by Mach Exception Handling exploit. CVE-2006-3730 Exploits/Client Side Windows
02.14.2006 Windows IGMPv3 IP Options parsing Remote DoS Some Windows kernel versions are susceptible to a remote denial-of-service vulnerability. This issue allows remote attackers to crash affected kernels, denying further network service to legitimate users (MS06-007). CVE-2006-0021 Denial of Service/Remote Windows
02.21.2007 Windows Image Acquisition CmdLine exploit The Window Image Acquisition (WIA) Service in Microsoft Windows XP allows local users to gain privileges via a stack overflow when processing the bsCmdLine parameter of the IWiaDevMgr::RegisterEventCallbackProgram function. CVE-2007-0210 Exploits/Local Windows
02.10.2011 Windows Live Mail dwmapi DLL Hijacking Exploit Windows Live Mail is prone to a vulnerability that may allow the execution of any library file named dwmapi.dll, if this dll is located in the same folder as an .EML file. NOCVE-9999-46918 Exploits/Client Side Windows
10.18.2007 Windows Macrovision (SECDRV.SYS) Memory Corruption Exploit This module exploits a vulnerability in Windows XP when the 0xCA002813 function is invoked with a specially crafted parameter. The IOCTL 0xCA002813 handler in the SECDRV.SYS device driver in Macrovision products, installed by default in Windows XP and Windows 2003, allows local users to overwrite memory and execute arbitrary code via malformed Interrupt Request Packet (Irp) parameters. CVE-2007-5587 Exploits/Local Windows
10.22.2007 Windows Macrovision (SECDRV.SYS) Memory Corruption Exploit Update This module exploits a vulnerability in Windows XP and Windows 2003 when the 0xCA002813 function is invoked with a specially crafted parameter. The IOCTL 0xCA002813 handler in the SECDRV.SYS device driver in Macrovision products, installed by default in Windows XP and Windows 2003, allows local users to overwrite memory and execute arbitrary code via malformed Interrupt Request Packet (Irp) parameters. This update corrects the CVE number and adds Windows 2003 as Supported System. CVE-2007-5587 Exploits/Local Windows
07.11.2006 Windows Mailslot (MS06-035) DoS This module exploits a remote vulnerability that could allow an attacker to send a specially crafted SMB message to an affected system causing a denial of service (MS06-035). WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2006-3942 Denial of Service/Remote Windows
08.17.2006 Windows Mailslot DoS Update The server driver (srv.sys) in Microsoft Windows 2000 SP4, Server 2003 SP1 and earlier, and XP SP2 and earlier allows remote attackers to cause a denial of service (crash) via a crafted packet on an SMB PIPE that triggers a null dereference. While investigating the Microsoft Server Service Mailslot heap overflow vulnerability reported in Microsoft Security Bulletin MS06-035 we discovered a second bug in the server service. This module exploits this vulnerability. For more info go to http://www.coresecurity.com/common/showdoc.php?idx=562&idxseccion=10 CVE-2006-3942 Exploits/Remote Windows

Pages