Core Certified Exploits

We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Subscribe to receive regular updates by email:

 

Browse All Exploits

 

 

Title Description CVE Link Exploit Platform Exploit Type
OracleDB AUTH_SESSKEY Remote Buffer Overflow Exploit Update This module exploits a vulnerability in the Oracle Database Server. The vulnerability is triggered when the server processes a long string inside the AUTH_SESSKEY property resulting in a stack-based buffer overflow. This update adds support for Windows 2003 SP2 and Oracle 10.2.0.4. Windows Exploits/Remote
Sun Java System Web Server Webdav Stack Overflow This module exploits a buffer overflow vulnerability in the Sun Web Server Webdav service when parsing OPTION requests. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. Windows Exploits/Remote
Wordpress Google Analytics Plugin Cross-Site Scripting Exploit Input passed to the "s" parameter in index.php is not properly sanitised before being returned to the user in googleanalytics.php. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. Exploits/Cross Site Scripting (XSS)/Known Vulnerabilities
Sun Java System Web Server Digest DoS Multiple vulnerabilities have been identified in Sun Java System Web Server, which could be exploited by remote attackers to cause a denial of service or compromise a vulnerable system. These issues are caused by buffer overflow errors when processing malformed "TRACE" or "OPTIONS" requests, or overly long "Authorization: Digest" headers, which could be exploited by attackers to crash an affected server or execute arbitrary code. This exploit forces the server process to throw an unhandled exception and be restarted. WARNING: This is an early release module. Solaris Denial of Service/Remote
Microsoft Internet Explorer Event Handling Exploit Update The vulnerability is caused due to a use-after-free error when handling events when the object firing the event is removed from the markup. This update improves the post-exploitation steps. Windows Exploits/Client Side
Microsoft Windows GP Trap Handler Privilege Escalation Exploit Incorrect assumptions in the support code of legacy 16bit applications in Microsoft Windows operating systems allows local users to gain system privileges via the "NtVdmControl" system call. This module exploits the vulnerability and installs an agent with system privileges. This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Windows Exploits/Local
Microsoft Internet Explorer Event Handling Exploit The vulnerability is caused due to a use-after-free error when handling events when the object firing the event is removed from the markup. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. Windows Exploits/Client Side
HP OpenView Storage Data Protector Remote Buffer Overflow Exploit Update This module exploits a remote buffer overflow in the OmniInet.exe service included in the HP OpenView Storage Data Protector application by sending a malformed MSG_PROTOCOL packet. This update adds support for HP OpenView Storage Data Protector 6.0 and for Windows XP and Vista. Windows Exploits/Remote
Savant Web Server Remote Buffer Overflow Exploit A remote buffer-overflow vulnerability affects Savant Web Server. This issue occurs because the application fails to validate the length of user-supplied strings before copying them into finite process buffers. Windows Exploits/Remote
Microsoft Windows Remote Kernel Infinite Loop DoS Update This module sends a malformed NetBIOS packet which causes the execution of an infinite loop in the target system. This update adds support to Microsoft Windows 2008 and more Microsoft Windows 7 versions. This update adds support to Microsoft Windows as source agent spoofing a network address. Windows Denial of Service/Client Side
BigAnt IM Server USV Request Remote Buffer Overflow Exploit This module exploits a vulnerability in the AntServer Module (AntServer.exe) to cause a stack-based buffer overflow, by sending a specially crafted, overly long "USV" request to the TCP port where the server is listening. Windows Exploits/Remote
HP OpenView Storage Data Protector Remote Buffer Overflow Exploit This module exploits a remote buffer overflow in the OmniInet.exe service included in the HP OpenView Storage Data Protector application by sending a malformed MSG_PROTOCOL packet. Windows Exploits/Remote
SAP GUI SAPLPD Multiple Command Buffer Overflow Exploit Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands. Windows Exploits/Remote
Novell iPrint Client Target Frame Parameter Buffer Overflow Exploit This module exploits a vulnerability in the ienipp.ocx control included in the Novell iPrint Client application. The exploit is triggered when the Target Frame parameter processes a long string argument resulting in a stack-based buffer overflow. Windows Exploits/Client Side
Symantec Veritas VRTSweb Privilege Escalation Exploit This module exploits a code execution vulnerability in the Veritas Web Server service by sending a specially crafted authentication request to the 14300/TCP port. That can be exploited by local users to gain elevated privileges. Windows Exploits/Local
Adobe Illustrator CS4 Encapsulated Postscript Buffer Overflow Exploit Adobe Illustrator is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Specifically, overly long DSC comments in Encapsulated PostScript .EPS files may corrupt memory. Windows Exploits/Client Side
HP OpenView NNM ovalarm CGI Remote Buffer Overflow Exploit This module exploits a buffer overflow vulnerability in the ovalarm.exe application, part of the HP OpenView Network Node Manager application. The exploit triggers a stack-based buffer overflow by sending a specially crafted HTTP request to the ports 3443/TCP or 80/TCP of the vulnerable system and installs an agent if successful. Windows Exploits/Remote
Adobe PDF Newplayer JavaScript Buffer Overflow Exploit Update This module exploits a vulnerability in Adobe Reader and Adobe Acrobat Professional .PDF files. The vulnerability is caused due to boundary errors in newplayer() method in multimedia.api. This can be exploited to cause a buffer overflow when a specially crafted .PDF file is opened. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. This Update adds support for Windows XP SP3 and Vista. Windows Exploits/Client Side
Novell iPrint Client Date Time Parameter Buffer Overflow Exploit This module exploits a vulnerability in the ienipp.ocx control included in the Novell iPrint Client application. The exploit is triggered when the Date Time parameter processes a long string argument resulting in a stack-based buffer overflow. Windows Exploits/Client Side
Microsoft Office Word File Information Block (FIB) Buffer Overflow Exploit (MS09-068) Update A vulnerability exists in Microsoft Office Word when handling a specially crafted Word file that includes a malformed File Information Block (FIB). Windows Exploits/Client Side
Adobe PDF Newplayer JavaScript Buffer Overflow Exploit This module exploits a vulnerability in Adobe Reader and Adobe Acrobat Professional .PDF files. The vulnerability is caused due to boundary errors in newplayer() method in multimedia.api. This can be exploited to cause a buffer overflow when a specially crafted .PDF file is opened. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. WARNING: This is an early release module. This is not the final version of this module. Windows Exploits/Client Side
IBM Access Support GetXMLValue ActiveX Control Buffer Overflow Exploit A vulnerability has been identified in IBM Access Support ActiveX, which could be exploited by remote attackers to compromise an affected system. This issue is caused by a buffer overflow error in the "IbmEgath.dll" module when processing malformed data passed to the "GetXMLValue()" method, which could be exploited by remote attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page. Windows Exploits/Client Side
HP Operations Manager Server Backdoor Account Exploit This module exploits a remote code execution vulnerability in HP Operations Manager by using an undocumented user account to upload an arbitrary file. Windows Exploits/Remote
ProShow Gold PSH Buffer Overflow Exploit The vulnerability is caused due to a boundary error when processing certain overly long entries within slideshow project files (.PSH). Windows Exploits/Client Side
OpenSSH Channel Exploit Update Exploits an off-by-one bug in channel management code in OpenSSH. This update excludes the module from automated attacks launched by the "Network Attack and Penetration" feature, since the module requires credentials of a known account on the vulnerable system, and hence won't work with default parameters. OpenBSD Exploits/Remote