Core Impact Pro Exploits and Security Updates

When you buy Core Impact Pro, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact Pro. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact Pro keeps you there.

Use the controls below to navigate Core Impact exploits and other modules.

Released Date Title Description Vulnerabilty Categorysort descending Platform
10.23.2012 EMC Replication Manager Client irccd.exe Misconfiguration Exploit The best practice for installations of EMC Replication Manager is to register a Replication Manager Client (irccd.exe) instance with the appropiate Replication Manager Server (ird.exe) as soon as the client software is installed on a host. Registration is performed by Replication Manager administrators from within the Replication Manager Server. In the time span exposed before registering a Replication Manager Client instance with a Replication Manager Server, the RunProgram function of the Replication Manager Client instance can be invoked with arbitrary arguments by remote unauthenticated attackers in order to execute arbitrary code with SYSTEM privileges on the vulnerable machine. This module exploits this misconfiguration scenario in order to install an agent on machines running still unregistered instances of EMC Replication Manager Client. NOCVE-9999-55211 Exploits/Remote Code Execution Windows
06.07.2011 CA Total Defense UNCWS Web Service getDBConfigSettings Remote Code Execution Exploit The UNCWS Web Service component of CA Total Defense listens for SOAP requests. A remote unauthenticated attacker can invoke the getDBConfigSettings method, and the Web Service will answer with the server's database credentials. Once that the database credentials are captured, it is possible for a remote attacker to connect to the database and execute arbitrary code under the context of the database administrator. CVE-2011-1655 Exploits/Remote Code Execution Windows
09.05.2010 Atlassian FishEye Struts 2 ParametersInterceptor Remote Code Execution Exploit The ParametersInterceptor class of XWork framework, part of the Struts 2 web framework, as shipped with Atlassian FishEye, does not properly restrict access to server-side objects. This can be exploited by remote unauthenticated attackers to modify server-side objects and e.g. execute arbitrary commands via specially crafted OGNL (Object-Graph Navigation Language) expressions. CVE-2010-1870 Exploits/Remote Code Execution Windows, Solaris, Linux
06.28.2010 JBoss Enterprise Application Platform JMX Console Authentication Bypass Remote Code Execution Exploit The JMX-Console web application in JBoss Enterprise Application Platform performs access control only for the GET and POST methods, which allows remote attackers to send requests to this application's GET handler by using a different method. This module will exploit this vulnerability to deploy an agent by uploading a JSP file to the target server. CVE-2010-0738 Exploits/Remote Code Execution Linux
02.09.2010 Oracle Secure Backup Remote Command Execution Exploit Update This vulnerability allows remote attackers to bypass authentication on vulnerable installations of Oracle Secure Backup. User interaction is not required to exploit this vulnerability. The specific flaw exists in the logic used to authenticate a user to the administration server running on port 443. The script login.php does not properly sanitize the 'username' variable before using it in a database query. A specially crafted 'username' allows unauthorized attackers to log in with full administrative capabilities. This update adds Solaris support. CVE-2009-1977 Exploits/Remote Code Execution Windows, Solaris
12.04.2012 WeBid converter Remote Code Execution Exploit Input passed via the "from" and "to" POST parameters to converter.php is not properly sanitised before being stored in includes/currencies.php. This can be exploited to inject and execute arbitrary PHP code. NOCVE-9999-53406 Exploits/Remote Code Execution Solaris, Linux, Windows, Mac OS X
12.04.2012 OP5 license Remote Code Execution Exploit op5 Appliance contains an input validation flaw related to the system-portal component that allows a remote attacker to execute arbitrary shell commands via command injection. CVE-2012-0261 Exploits/Remote Code Execution
08.27.2014 Openfiler Remote Code Execution Exploit Insufficient sanitization in Openfile's /admin/system.html 'Hostname' field, leads to remote code execution. NOCVE-9999-65590 Exploits/Remote Code Execution Linux
09.23.2010 JBoss Seam 2 Framework actionOutcome Remote Code Execution Exploit An input sanitization flaw was found in the way JBoss Seam processes certain parameterized JBoss Expression Language (EL) expressions. A remote unauthenticated attacker could use this flaw to execute arbitrary code via GET requests, containing specially-crafted expression language parameters, provided to web applications based on the JBoss Seam framework. This module exploits the vulnerability in any web application based on vulnerable versions of the Seam 2 framework. CVE-2010-1871 Exploits/Remote Code Execution Linux
08.03.2011 Oracle GlassFish Server Administration Console Authentication Bypass Remote Code Execution Exploit The Administration Console of Oracle GlassFish Server is prone to an authentication bypass vulnerability, which can be achieved by performing HTTP TRACE requests. A remote unauthenticated attacker can exploit this in order to execute arbitrary code on the vulnerable server. CVE-2011-1511 Exploits/Remote Code Execution Solaris, Windows, Linux, Mac OS X
03.21.2012 CA Total Defense UNCWS Web Service exportReport Remote Code Execution Exploit The UNCWS Web Service component of CA Total Defense listens for SOAP requests. The exportReport method makes use of the uncsp_GenerateReports_Dashboard stored procedure, which is vulnerable to SQL Injection. A remote unauthenticated attacker can exploit this to execute arbitrary code on a vulnerable machine with SYSTEM privileges. NOCVE-9999-51517 Exploits/Remote Code Execution Windows
01.04.2012 Microsoft Windows TrueType Font Parsing Vulnerability DoS (MS11-087) When a crafted TTF file is processed by Windows kernel it produces a stack exhaustion finishing it in a BSoD. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2011-3402 Denial of Service/Local Windows
10.12.2010 Microsoft Windows OpenType Font Validation DoS (MS10-078) This module exploits a vulnerability in the way that the Windows OpenType Font (OTF) format driver improperly parses specially crafted OpenType fonts. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2010-2741 Denial of Service/Local Windows
07.14.2011 Microsoft Windows CSRSS Local EOP SrvSetConsoleNumberOfCommand Vulnerability DoS (MS11-056) This module exploits a vulnerability on Microsoft Windows "CSRSS.EXE" process and causes a BSoD. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2011-1283 Denial of Service/Local Windows
02.14.2011 Microsoft Windows Hyper-V VMBus Vulnerability DoS (MS10-102) This module exploits a vulnerability on Microsoft Hyper-V sending a crafted packet from the "guest OS" to the "host OS" through the vmbus mechanism. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2010-3960 Denial of Service/Local Windows
06.03.2010 Microsoft Windows Exception Handler DoS (MS10-021) This module exploits a vulnerability in Microsoft Windows via a specially crafted call to the vulnerable function. CVE-2010-0810 Denial of Service/Local Windows
12.19.2013 Microsoft Windows Win32k Integer Overflow DoS (MS13-101) Update This module exploits a vulnerability in win32k.sys by calling to "NtGdiGetTextExtent" function with crafted parameters. This update adds support to Windows 2003 (32 and 64 bits), Windows Vista (32 and 64 bits), Windows 2008 (32 and 64 bits), Windows 7 64 bits, Windows 2008 R2, Windows 8 ( 32 and 64 bits) and Windows 2012. CVE-2013-5058 Denial of Service/Local Windows
05.16.2013 Microsoft Windows Win32k Divide Error Exception DoS (MS13-046) This module exploits a Windows kernel vulnerability calling to "NtGdiScaleViewportExtEx" function by using crafted parameters. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2013-1334 Denial of Service/Local Windows
06.09.2014 Microsoft Windows Win32k Information Disclosure Vulnerability DoS (MS14-015) This module exploits a vulnerability in "win32k.sys" by calling to "NtUserValidateHandleSecure" function with crafted parameters. This is a documentation update from the original module "Microsoft Windows Win32k IsHandleEntrySecure Null Pointer Dereference DoS". CVE-2014-0323 Denial of Service/Local Windows
06.16.2010 Microsoft Windows Registry SymLink DoS (MS010-021) This module exploits a denial of service vulnerability in the Windows kernel related to the way the kernel processes values of registry symbolic links. CVE-2010-0235 Denial of Service/Local Windows
06.13.2011 Microsoft Windows Hyper-V VMBus Non Responsiveness Vulnerability DoS (MS11-047) This module exploits a vulnerability on Microsoft Hyper-V sending a crafted packet from the "guest OS" to the "host OS" through the vmbus mechanism producing a non responsiveness effect in the all virtual machines running at the time. CVE-2011-1872 Denial of Service/Local Windows
01.11.2012 Microsoft Windows TrueType Font Parsing Vulnerability DoS (MS11-087) Update This update adds support to Microsoft Windows Vista, Microsoft Windows 2008 and Microsoft Windows 7. When a crafted TTF file is processed by Windows kernel it produces a stack exhaustion finishing it in a BSoD. CVE-2011-3402 Denial of Service/Local Windows
04.19.2013 Microsoft Windows Win32k Font Parsing Vulnerability DoS (MS13-036) This module exploits a vulnerability in Windows kernel (win32k.sys) when a crafted TTF font is open. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2013-1291 Denial of Service/Local Windows
12.05.2012 Microsoft Windows TrueType Font File Vulnerability DoS (MS12-075) This module causes a BSOD in Microsoft Windows when parsing a specially crafted .TTF font file. CVE-2012-2897 Denial of Service/Local Windows
08.19.2010 Microsoft Windows CreateDIBPalette Local DoS This module exploits a vulnerability in Microsoft Windows via a specially crafted call to the vulnerable function CreateDIBPalette. CVE-2010-2739 Denial of Service/Local Windows
11.30.2009 OpenBSD XMM Exceptions DoS OpenBSD is prone to a local denial-of-service vulnerability. XMM exceptions are not correctly handled, resulting in a kernel panic. CVE-2009-3572 Denial of Service/Local OpenBSD
06.14.2011 Microsoft Windows Win32k OTF Validation DoS (MS11-041) This module causes a BSOD in Microsoft Windows when parsing a specially crafted OpenType font file. This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2011-1873 Denial of Service/Local Windows
01.16.2014 Microsoft Windows Win32k IsHandleEntrySecure Null Pointer Dereference DoS This module exploits a vulnerability in win32k.sys calling win32k!IsHandleEntrySecure function with crafted parameters. NOCVE-9999-60893 Denial of Service/Local Windows
08.08.2010 Avast Internet Security aswFW.sys Driver IOCTL Handling Local DoS Avast! Internet Security is prone to a local denial-of-service vulnerability. Local attackers can exploit this issue to cause denial-of-service conditions. NOCVE-9999-44673 Denial of Service/Local Windows
03.13.2011 Microsoft Windows Hyper-V VMBus Vulnerability DoS (MS10-102) Update This module adds support to Microsoft Windows 2003, Microsoft Windows Vista and Microsoft Windows Seven as a "guest OS". This module exploits a vulnerability on Microsoft Hyper-V sending a crafted packet from the "guest OS" to the "host OS" through the vmbus mechanism. CVE-2010-3960 Denial of Service/Local Windows

Pages