Core Certified Exploits

We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Subscribe to receive regular updates by email:

 

Browse All Exploits

 

 

Title Description Date Added CVE Link Exploit Platform Exploit Type
EZip Wizard Buffer Overflow Exploit update A stack-based buffer overflow in eZip Wizard allows an attacker to execute arbitrary code via a crafted .ZIP file that contains a file with a long name. This update makes a correction to a parameter name. June 1, 2009 Windows Exploits/Client Side
D-Link TFTP Transporting Mode Buffer Overflow Exploit D-Link TFTP Server 1.0 allows remote attackers to cause a buffer overflow via a long GET request, which triggers the vulnerability. June 1, 2009 Windows Exploits/Remote
BS Player BSL Buffer Overflow Exploit BS Player contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error when handling crafted .BSL files. June 1, 2009 Windows Exploits/Client Side
Steamcast GET Request Remote Buffer Overflow Exploit A boundary error can be exploited to cause a stack-based buffer overflow by sending a specially crafted GET HTTP request with an overly long path to the web server. May 28, 2009 Windows Exploits/Remote
AIX Setlocale Function Local Privilege Escalation Exploit The AIX Setlocale Function is prone to a local privilege-escalation vulnerability. A local attacker may be able to exploit this issue to gain elevated privileges on the affected computer. A successful exploit will lead to the complete compromise of the affected computer. May 28, 2009 AIX Exploits/Local
UltraISO CCD and IMG Buffer Overflow Exploit A stack-based buffer overflow in UltraISO allows an attacker to execute arbitrary code via crafted .CCD and .IMG file. May 28, 2009 Windows Exploits/Client Side
Microsoft Office PowerPoint PPT 7 Memory Corruption Exploit (MS09-017) This module exploits a stack overflow on "pp7x32.dll" when it parses an inconsistent record length in sound data in a file that uses a PowerPoint 95 (PPT95) native file format. May 28, 2009 Windows Exploits/Client Side
Ston3d Player Command Injection Exploit This module exploits a remote command injection vulnerability in Ston3DWebPlayer and Ston3DStandalonePlayer via an specially crafted STK file. May 27, 2009 Windows Exploits/Client Side
Lotus Notes WPD File Processing Buffer Overflow Exploit This module exploits a buffer overflow vulnerability in Lotus Notes 8.0 when parsing a malformed, specially crafted WPD (Word Perfect Document) file. May 26, 2009 Windows Exploits/Client Side
Mambo output Remote File Inclusion Exploit A remote file inclusion vulnerability is present in Mambo. /includes/Cache/Lite/Output.php doesn't sanitize the $mosConfig_absolute_path before using it in an include. May 25, 2009 Exploits/Remote File Inclusion/Known Vulnerabilities
XBMC GET Request Remote Buffer Overflow Exploit This module exploits a vulnerability in XBMC by sending a specially crafted, overly long HTTP GET request to the application's web server which causes a stack-based buffer overflow, allowing arbitrary code execution. May 25, 2009 Windows Exploits/Remote
Microsoft Office Powerpoint PPT 4.0 Importer Buffer Overflow Exploit (MS09-017) This module exploits a stack-based based overflow in Microsoft Office Powerpoint when parsing a malformed .PPT 4.0 file with a specially crafted printer name. This is an early release module. This is not the final version of this module.It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. May 22, 2009 Windows Exploits/Client Side
ElbyCDIO IO Driver Privilege Escalation Exploit This module exploits a vulnerability in ElbyCDIO.SYS driver when handling a specially crafted IOCTL request. The vulnerability allows local users to overwrite memory and execute arbitrary code via malformed Interrupt Request Packet (Irp) parameters. May 21, 2009 Windows Exploits/Local
FreeBSD Telnetd Privilege Escalation Exploit Local attackers can exploit this issue to execute arbitrary code with superuser privileges. Successfully exploiting this issue will facilitate in the complete compromise of affected computers. May 20, 2009 FreeBSD Exploits/Local
IBM Director CIM Server Privilege Escalation Exploit IBM Director is prone to a privilege-escalation vulnerability that affects the CIM server. Attackers can leverage this issue to execute arbitrary code with elevated privileges in the context of the CIM server process. May 19, 2009 Windows Exploits/Local
SAP AG SAPgui EAI WebViewer3D Buffer Overflow Exploit This module exploits a stack overflow in Siemens Unigraphics Solutions Teamcenter Visualization EAI WebViewer3D ActiveX control that is bundled with SAPgui. When parsing an overly long string the SaveViewToSessionFile() method, arbitrary code may be executed. May 18, 2009 Windows Exploits/Client Side
AstonSoft DeepBurner DBR Compilation Buffer Overflow Exploit AstonSoft DeepBurner is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before using it in a memory copy operation. May 14, 2009 Windows Exploits/Client Side
Talkative IRC PRIVMSG Buffer Overflow Exploit Talkative IRC is prone to a stack-based buffer-overflow vulnerability because it fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. May 13, 2009 Windows Exploits/Client Side
VUPlayer CUE Buffer Overflow Exploit VUPlayer contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error when handling .CUE files. May 13, 2009 Windows Exploits/Client Side
Sun xVM VirtualBox Exploit This module exploits a local privilege escalation vulnerability in certain packages shipped with Sun xVM VirtualBox for the Linux platform. May 7, 2009 Linux Exploits/Local
Rosoft Media Player M3U Buffer Overflow Exploit Update Rosoft Media Player is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input of M3U files. This update adds support till the last version of the program.(4.2.1 and 4.3.1) May 6, 2009 Windows Exploits/Client Side
GNOME Dia PySys_SetArgv Remote Command Execution Exploit A design error has been discovered in GNOME's Dia, which can be exploited by sending a malicious file to vulnerable victims. May 5, 2009 Linux Exploits/Client Side
Adobe PDF CustomDictionaryOpen Buffer Overflow Exploit This module exploits a vulnerability in Adobe Reader and Adobe Acrobat Professional .PDF files. The vulnerability is caused due to boundary errors in the customdictionaryopen() method in Javascript api. This can be exploited to cause a heap overflow when a specially crafted PDF file is opened. May 4, 2009 Linux Exploits/Client Side
Belkin BullDog Plus UPS-Service Buffer Overflow Exploit The UPS management software contains a built-in web server which allows for remote management of the UPS. The management interface is protected by a username and password and the authentication is performed via Basic authentication. There is a small stack-based overflow in the base64 decoding routine which handles the Basic authentication data. April 29, 2009 Windows Exploits/Remote
MediaCoder M3U playlist Buffer Overflow Exploit MediaCoder contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in MediaCoder when handling .M3U files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .M3U file. April 29, 2009 Windows Exploits/Client Side