Core Certified Exploits

We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Subscribe to receive regular updates by email:

 

Browse All Exploits

 

 

Title Description Date Added CVE Link Exploit Platform Exploit Type
Microsoft Windows Web Services on Devices Memory Corruption DoS (MS09-063) The vulnerability is caused due to a WSD message with a long header value, this can lead to memory corruption within the process hosting WSDApi.dll. This can cause the service or application to crash. To be clear, the vulnerability is in the Windows module used to interact with devices that support Web Services on Devices, and does not affect the devices themselves. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. November 18, 2009 Windows Denial of Service/Remote
MSRPC _LlsrLicenseRequestW Remote Heap Overflow Exploit (MS09-064) This module exploits a remote heap-based overflow in the Microsoft Windows License Logging Service by sending a specially crafted RPC request. November 18, 2009 Windows Exploits/Remote
NetBIOS Cache Corruption Update Corrupts the NetBIOS Cache to allow redirection of NetBIOS and DNS names to an arbitrary IP Address. This update fixes a problem when closing the local udp port used by the module, in cases where the execution was stopped manually. November 18, 2009 Windows Exploits/Tools
Sun Java getSoundBank Buffer Overflow Exploit This module exploits a stack based buffer overflow vulnerability in Sun Java SE in JDK and JRE when the HsbParser.getSoundBank function in jsound.dll handles a specially crafted .JAR file. November 18, 2009 Windows Exploits/Client Side
Adobe RoboHelp Server File Upload Code Execution Exploit This module exploits a remote .JSP code injection in Adobe RoboHelp Server by sending a specially crafted HTTP request to the affected service. November 16, 2009 Windows Exploits/Remote
Microsoft Windows Embedded OpenType Fonts Integer Overflow DoS (MS09-065) This module causes a DoS in win32k.sys when attempts to render an embedded font. WARNING: This is an early release module. November 16, 2009 Windows Denial of Service/Client Side
MSRPC LlsrLicenseRequestW Remote Heap Overflow DoS (MS09-064) This module triggers a Denial Of Service condition in the Microsoft Windows License Logging Service by sending a specially crafted RPC request. WARNING: This is an early release module. November 16, 2009 Windows Denial of Service/Remote
Free Download Manager Control Server Remote Buffer Overflow Exploit A boundary error in the Remote Control Server when processing Authorization headers in HTTP requests can be exploited to cause a stack-based buffer overflow via an HTTP request containing an overly long Authorization header. November 12, 2009 Windows Exploits/Remote
Microsoft Windows Remote Kernel Infinite Loop DoS This module sends a malformed NetBIOS packet executing an infinite loop in the target. This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. November 12, 2009 Windows Denial of Service/Client Side
HP LoadRunner XUpload ActiveX Control Bufer Overflow Exploit Boundary errors exists in HP LoadRunner in Persits.XUpload.2 ActiveX control (XUpload.ocx) when processing arguments passed to the "AddFile()" method. This can be exploited to cause stack-based buffer overflows by passing specially crafted, overly-long strings as argument to the affected method. November 10, 2009 Windows Exploits/Client Side
Kerio PF Administration Exploit Update Buffer overflow in the administrator authentication process for Kerio Personal Firewall (KPF) 2.1.4 and earlier allows remote attackers to execute arbitrary code via a handshake packet. This update improves the reliability of the exploit when using the "Reuse connection" method to connect new agents. November 9, 2009 Windows Exploits/Remote
Omni-NFS Enterprise FTP Server Buffer Overflow Exploit This vulnerability is caused by a buffer overflow in Omni-NFS Enterprise FTP Server, due to its lack of checking of user-supplied data within FTP requests. November 8, 2009 Windows Exploits/Remote
Microsoft Windows Print Spooler Buffer Overflow Exploit (MS09-022) This module exploits a buffer overflow vulnerability in the EnumeratePrintShares function in the Print Spooler Service in Microsoft Windows to install an agent in the target machine. November 8, 2009 Windows Exploits/Remote
IBM Installation Manager URI Handler Argument Injection Exploit This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by instantiating the "iim" uri handler with a malicious DLL(impact.dll) as parameter. November 8, 2009 Windows Exploits/Client Side
BigAnt IM Server HTTP GET Request Remote Buffer Overflow Exploit Update This module exploits a vulnerability in the AntServer Module (AntServer.exe) that can be exploited to cause a stack-based buffer overflow by sending a specially crafted, overly long HTTP GET request to default port 6660/TCP. This update adds support for the latest version of the software, which is still vulnerable to the attack. November 8, 2009 Windows Exploits/Remote
VLC Media Player MP4 Demuxer Buffer Overflow Exploit VLC media player is prone to multiple stack-based buffer-overflow vulnerabilities. When parsing a MP4, ASF or AVI file with an overly deep box structure, a stack overflow might occur. It would overwrite the return address and thus redirect the execution flow. Attackers can exploit these issues to execute arbitrary code in the context of the affected application or crash the application, denying service to legitimate users. VLC media player 1.0.1 is vulnerable; prior versions may also be affected. November 5, 2009 Windows Exploits/Client Side
IBM Informix Products Setnet32 Utility NFX Buffer Overflow Exploit Multiple IBM Informix products are prone to a buffer-overflow vulnerability because the software fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. November 4, 2009 Windows Exploits/Client Side
Httpdx Web Server GET Request Buffer Overflow Exploit The vulnerability is caused due to a boundary error within Httpdx when processing HTTP GET Request. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to the affected command. November 4, 2009 Windows Exploits/Remote
Blender Embedded Script Exploit This module abuses the scripting functionality in Blender to trigger remote code execution via a blender file with an embedded python script. November 4, 2009 Windows Exploits/Client Side
Adobe Flash Player SWF Content Exploit Update This module exploits a vulnerability in Adobe Flash Player triggered when processing a specially crafted .SWF file. This update adds support for One Link Multiple Clientsides. November 2, 2009 Windows Exploits/Client Side
Microsoft Excel Hlink Overflow Exploit Update This update adds support for Microsoft Excel 2000 SP3 and Microsoft Excel 2003 SP3. This module exploits a buffer overflow in the Microsoft Excel file via a hyperlink bigger than 8000 bytes of length. November 1, 2009 Windows Exploits/Client Side
Symantec Altiris Deployment Solution ActiveX Exploit This module exploits an arbitrary file download and execute vulnerability in the Altiris.AeXNSPkgDL.1 ActiveX Control included in Symantec Altiris Deployment Solution. October 28, 2009 Windows Exploits/Client Side
Novell eDirectory Network Request Buffer Overflow Exploit A boundary error exists in the dhost.dll component of Novell eDirectory post authentication when processing list of modules. This can be exploited to cause a stack-based buffer overflow via a specially crafted request with an overly long module name. WARNING:This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. October 28, 2009 Windows Exploits/Remote
ISC BIND Dynamic Update Message DoS Exploit A vulnerability has been identified in ISC BIND, which could be exploited by remote attackers to cause a denial of service. This issue is caused due to the "dns_db_findrdataset()" function failing when the prerequisite section of a dynamic update message contains a record of type "ANY" and where at least one RRset for this FQDN exists on the server, which could allow attackers to cause a vulnerable server to exit when receiving a specially crafted dynamic update message sent to a zone for which the server is the master. October 27, 2009 Solaris Denial of Service/Remote
InterSystems Cache Argument Buffer Overflow Exploit This module exploits a stack overflow in InterSystems Cache by sending a specially crafted GET request. October 27, 2009 Windows Exploits/Remote