Core Certified Exploits

We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Subscribe to receive regular updates by email:

 

Browse All Exploits

 

 

Title Description Date Added CVE Link Exploit Platform Exploit Type
Drupal BlogAPI Remote Code Execution Exploit The BlogAPI module does not validate the extension of files that it is used to upload, enabling users with the "administer content with blog api" permission to upload harmful files. This module uploads an IMPACT agent, creates a php file to execute the agent and then makes a request to the file. The result is an IMPACT agent running on the webserver. June 28, 2009 Linux Exploits/Remote
Mantis Manage_proj_page Remote Code Execution Exploit Update This update gives this exploit support for Windows platforms. June 25, 2009 Linux Exploits/Remote
Microsoft Word Record Parsing Buffer Overflow Exploit (MS09-027) Update Microsoft Word is prone to a buffer-overflow vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed exploit attempts will likely result in denial-of-service conditions. This update add support for Office XP and Windows Vista. June 24, 2009 Windows Exploits/Client Side
AIX libtt.a rpc.ttdbserver Buffer Overflow Exploit This module exploits a buffer overflow vulnerability in the ToolTalk library libtt.a. After successful exploitation an agent running as root will be installed on the target machine. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. June 22, 2009 AIX Exploits/Remote
Apache Incomplete Header DoS This module creates a large number of connections to the Apache server that are left opened preventing it from accepting legitimate requests. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. June 21, 2009 Windows Denial of Service/Remote
Microsoft Word Record Parsing Buffer Overflow Exploit (MS09-027) Microsoft Word is prone to a buffer-overflow vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed exploit attempts will likely result in denial-of-service conditions. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. June 18, 2009 Windows Exploits/Client Side
Microsoft Windows Print Spooler Load Library Vulnerability Exploit (MS09-022) This module takes advantage of an insufficient library path check in spoolsv.exe service loading a dll with system user privileges. This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. June 18, 2009 Windows Exploits/Local
Apple iTunes ITMS Buffer Overflow Exploit This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple iTunes. The specific flaw exists in the URL handlers associated with iTunes. When processing URLs via the protocol handlers ITMS, ITMSS, DAAP, PCAST, and ITPC an exploitable stack overflow occurs. June 16, 2009 Windows Exploits/Client Side
AIX Pioout Local Buffer Overflow Privilege Escalation Exploit AIX Pioout is prone to a vulnerability that allows attackers to execute arbitrary code with superuser privileges. This is due to insecure permissions shared libraries. June 16, 2009 AIX Exploits/Local
Microsoft DirectX DirectShow QuickTime Video Exploit This module exploits a stack corruption in the DirectShow Quicktime Movie parser in quartz.dll of Microsoft DirectX. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. June 16, 2009 Windows Exploits/Client Side
Symantec WinFax Buffer Overflow Exploit This module exploits a stack overflow in library DCCFAXVW.DLL of Symantec WinFax Pro. When passing an overly long string to the AppendFax() method, arbitrary code may be executed. June 16, 2009 Windows Exploits/Client Side
Linux Kernel UDEV Local Privilege Escalation Exploit The 'udev' Linux application is prone to a local privilege-escalation vulnerability because it fails to properly handle netlink messages. Local attackers may exploit this issue to gain elevated privileges, which may lead to a complete compromise of the system. June 15, 2009 Linux Exploits/Local
Symantec System Center Alert Management System Command Execution Exploit The AMS2 (Alert Management Systems 2) component of multiple Symantec products is prone to a remote command-execution vulnerability because the software fails to adequately sanitize user-supplied input. June 11, 2009 Windows Exploits/Remote
Microchip MPLAB IDE MCP File Handling Remote Buffer Overflow Exploit This vulnerability arises from the way MPLAB IDE processes IDE Project files with extension of .mcp. It could lead to a critical buffer overflow error that allows hackers to execute malicious code on users systems. June 11, 2009 Windows Exploits/Client Side
Wordpress Weak Authentication Exploit An attacker, able to register a specially crafted username on a Wordpress 2.5 installation, will also be able to generate authentication cookies for other chosen accounts. This vulnerability exists because it is possible to modify authentication cookies without invalidating the cryptographic integrity protection. The proper way to exploit this vulnerability is to use a Wordpress account which its username starts with the word "admin", for example "admin99". This exploit will not be shown on WebApps reports. June 11, 2009 Exploits/Authentication Weakness
GNOME gEdit PySys_SetArgv Remote Command Execution Exploit A design error has been discovered in GNOME's gEdit, which can be exploited by sending a malicious file to vulnerable victims. June 11, 2009 Linux Exploits/Client Side
Microsoft Office PowerPoint Memory Corruption Exploit (MS09-017) Update This module exploits a stack overflow on "pp7x32.dll" when it parses an inconsistent record length in sound data in a file that uses a PowerPoint 95 (PPT95) native file format. This update adds support to Microsoft Office XP, support to Microsoft Windows 2000 and Microsoft Windows Vista. June 10, 2009 Windows Exploits/Client Side
MSRPC Server Service Remote Buffer Overflow Exploit (MS08-067) Update 4 This module exploits a vulnerability in the Microsoft Windows Server service by sending a specially crafted RPC request. This update adds reliability to all supported platforms. June 10, 2009 Windows Exploits/Remote
EMC AlphaStor Server Agent Buffer Overflow Exploit Multiple stack-based buffer overflows in the Command Line Interface process in the Server Agent in EMC AlphaStor 3.1 for Windows allow remote attackers to execute arbitrary code via crafted TCP packets to port 41025. June 8, 2009 Windows Exploits/Remote
ACDSee Products TIFF Buffer Overflow Exploit Multiple ACDSee products are prone to a buffer-overflow vulnerability because they fail to perform adequate boundary checks when processing a malformed TIF image. June 3, 2009 Windows Exploits/Client Side
FreeBSD ktimer Local Privilege Escalation Exploit FreeBSD is prone to a local privilege-escalation vulnerability because it fails to adequately bounds-check user-supplied data. An attacker can exploit this vulnerability to run arbitrary code with elevated privileges. June 3, 2009 FreeBSD Exploits/Local
OpenBSD PF IP ICMPV6 Remote DoS OpenBSD's PF is prone to a remote denial-of-service vulnerability. Exploiting this issue allows remote attackers to cause a kernel panic on affected computers, denying further service to legitimate users. June 2, 2009 OpenBSD Denial of Service/Remote
SDP Downloader ASX Buffer Overflow Exploit SDP Downloader contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in SDP Downloader when handling crafted .ASX files. June 2, 2009 Windows Exploits/Client Side
Apple CUPS HP-GL2 filter Remote Code Execution Exploit Update This module exploits a specific flaw in the Hewlett-Packard Graphics Language filter. Inadequate bounds checking on the pen width and pen color opcodes result in an arbitrary memory overwrite allowing for the execution of arbitrary code as the "hgltops" process uid. -Linux Support added June 2, 2009 Linux Exploits/Remote
Apple CUPS IPP_TAG_UNSUPPORTED Handling null pointer DoS This module exploits a vulnerability in Apple CUPS, when handling the IPP_TAG_UNSUPPORTED which could be exploited by attackers to cause a remote pre-authentication denial of service. June 1, 2009 Linux Denial of Service/Remote