Core Certified Exploits

We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Subscribe to receive regular updates by email:

 

Browse All Exploits

 

 

Title Description CVE Link Exploit Platform Exploit Type
Advantage Data Architect wfapi DLL Hijacking Exploit Advantage Data Architect is prone to a vulnerability that may allow the execution of any library file named wfapi.dll, if this dll is located in the same folder than a .ADT file. Windows Exploits/Client Side
Advantech ADAMView GNI File Buffer Overflow Exploit ADAMView is prone to a buffer overflow when handling specially crafted GNI files Windows Exploits/Client Side
Advantech Studio ISSymbol ActiveX Control Buffer Overflow Exploit Buffer overflow in the ISSymbol ActiveX control in ISSymbol.ocx in Advantech Studio allow remote attackers to execute arbitrary code via a long String argument in the InternationalOrder method. Windows Exploits/Client Side
Advantech Studio ISSymbol ActiveX Control Buffer Overflow Exploit Update Buffer overflow in the ISSymbol ActiveX control in ISSymbol.ocx in Advantech Studio allow remote attackers to execute arbitrary code via a long String argument in the InternationalOrder method. This verions adds suppport for Internet Explorer 8 and 9 and Windows 7. Windows Exploits/Client Side
Advantech WebAccess ActiveX AccessCode2 Parameter Buffer Overflow Exploit By providing an overly long string to the AccessCode2 parameter, an attacker may be able to overflow the static stack buffer. The attacker may then execute code on the target device remotely. Windows Exploits/Client Side
Advantech WebAccess Browser based HMI SCADA ActiveX NodeName Parameter Buffer Overflow Exploit A vulnerability within the webvact ActiveX control when handling NodeName parameter with overly long strings can be exploited to cause stack-based buffer overflows in Advantech WebAccess Browser-based HMI/SCADA Software. Windows Exploits/Client Side
Advantech WebAccess bwnodeip Buffer Overflow Exploit The specific flaw exists within bwnodeip.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. Windows Exploits/Remote
Advantech WebAccess Dashboard Viewer Remote Code Execution Exploit This module exploits an arbitrary file upload vulnerability in Advantech WebAccess. The specific flaw exists within the WebAccess Dashboard Viewer. Insufficient validation within the FileUpload script allows unauthenticated callers to upload arbitrary code to directories in the server where the code can be automatically executed under the high-privilege context of the IIS AppPool. Authentication is not required to exploit this vulnerability. Windows Exploits/Remote
Advantech WebAccess dvs GetColor Stack Buffer Overflow Exploit The specific flaw exists within the DVC.DvcCtrl ActiveX Control in dvs.ocx. The control does not check the length of an attacker-supplied string in the GetColor method before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process. Windows Exploits/Client Side
Advantech WebAccess Node certUpdate Directory Traversal Remote Code Execution Vulnerability Exploit Advantech WebAccess Node is vulnerable to an unauthenticated remote file inclusion, allowing attackers to execute arbitrary code in the system. Windows Exploits/Remote File Inclusion/Known Vulnerabilities
Advantech WebAccess nvA1Media Caption Heap-based Buffer Overflow Remote Code Execution Exploit The specific flaw exists within nvA1Media.ocx. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of the process. Windows Exploits/Client Side
Advantech WebAccess SCADA BwPAlarm Buffer Overflow Exploit Advantech WebAccess SCADA lack of proper validation of user supplied input may allow an attacker to cause the overflow of a buffer overflow and executes remote code. Windows Exploits/Remote
Advantech WebAccess SCADA GetUserPasswd BwPAlarm Buffer Overflow Exploit The flaw exists in the GetUserPasswd function in BwPAlarm.dll due to improper validation of user-supplied data before copying the data to a fixed size stack-based buffer when processing an IOCTL 70603 RPC message. Windows Exploits/Remote
Advantech WebAccess SCADA Webvrpcs ViewDll1 Buffer Overflow Exploit The specific flaw exists within the implementation of the 0x138bd IOCTL in the webvrpcs process. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this functionality to execute code under the context of Administrator. Windows Exploits/Remote
Advantech Webaccess webeye Connect Buffer Overflow Exploit The specific flaw exists within the Connect method in webeye.ocx module.The control does not check the length of an attacker-supplied string in the Connect method before copying it into a fixed length buffer on the stack. This allows an attacker to execute arbitrary code in the context of the browser process. Windows Exploits/Client Side
Advantech WebAccess webvrpcs Remote Command Execution Exploit The specific flaw exists within the implementation of the 0x2711 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. Windows Exploits/Remote
Advantech WebAccess webvrpcs Service BwWebSvc ProjectName sprintf Buffer Overflow Exploit The specific flaw exists within the implementation of the 0x13C83 IOCTL in the BwOpcTool subsystem. A stack-based buffer overflow vulnerability exists in a call to memcpy using the ProjectName parameter. An attacker can use this vulnerability to execute arbitrary code in the context of an administrator of the system. Windows Exploits/Remote
Advantech WebAccess webvrpcs Service DrawSrv TagGroup Buffer Overflow Exploit The specific flaw exists within the implementation of the 0x280A IOCTL in the DrawSrv subsystem. A stack-based buffer overflow vulnerability exists in a call to strcpy. An attacker can use this vulnerability to execute arbitrary code in the context of an administrator of the system. Windows Exploits/Remote
Advantech WebAccess Webvrpcs Service DrawSrv Untrusted Pointer Dereference Exploit The specific flaw exists within the implementation of the 0x2723 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this functionality to execute code under the context of Administrator. Windows Exploits/Remote
Advantech WebAccess Webvrpcs ViewDll1 Buffer Overflow Exploit The specific flaw exists within implementation of the 0x138bd IOCTL in the webvrpcs process. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. Windows Exploits/Remote
Advantech WebAccess webvrpcs viewdll1 VdBroadWinGetLocalDataLogEx Buffer Overflow Exploit The specific flaw exists within the implementation of the 0x13C80 IOCTL in the BwOpcTool subsystem in VdBroadWinGetLocalDataLogEx. When parsing the NamedObject structure, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length buffer. Windows Exploits/Remote
Advantech WebOP Designer Project File Heap Buffer Overflow Remote Code Execution Exploit The specific flaw exists within the parsing of a pm3 project file. A heap-based buffer overflow vulnerability exists in a call to memcpy. An attacker can leverage this vulnerability to execute arbitrary code in the context of the process. Windows Exploits/Client Side
Agilent Technologies Feature Extraction ActiveX Exploit The specific flaw exists within the AnnotateX dll ActiveX control included with the software. An attacker can use an unvalidated object parameter in the Insert() function to execute arbitrary code in the context of the browser. Windows Exploits/Client Side
Agnitum Outpost Security Suite Privilege Escalation Exploit This module exploits a vulnerability in Agnitum Outpost Security Suite acs.exe service server when handling a specially crafted request, sent to the acsipc_server named pipe. Attackers can leverage this issue to execute arbitrary code with elevated privileges in the context of the acs.exe server process. Windows Exploits/Local
AIX Libodm ODMPATH exploit This module exploits a vulnerability in the processing of the ODMPATH environment variable within the odm_searchpath() function. This function reads the ODMPATH variable from the user provided environment, and then copies it into a fixed sized stack buffer without properly validating its length. This results in a stack-based buffer overflow, and allows the saved return address to be overwritten allowing the execution of arbitrary code with root privileges. AIX Exploits/Local