Core Impact Security and Penetration Testing Updates

Core Impact Threat Intelligence Exploits, Security and Penetration Testing Updates

We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Fill out the form to sign up for email updates

Use the controls below to navigate Core Impact exploits and other modules.

タイトル 説明 Vulnerabilty Category Platform
Windows Win32k Elevation Of Privilege Exploit (CVE-2019-0803) 2 An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. CVE-2019-0803 Exploits/Local Windows
MAPLE Computer SNMP Administrator Exploit Maple Computer SNMP Administrator is prone to a buffer-overflow by sending a specially crafted packet with an overly long string on port 987. CVE-2019-13577 Exploits/Remote Windows
MAPLE Computer SNMP Administrator Exploit v19_1 Maple Computer SNMP Administrator is prone to a buffer-overflow by sending a specially crafted packet with an overly long string on port 987. CVE-2019-13577 Exploits/Remote Windows
LibreOffice LibreLogo Python Scripting Vulnerability Exploit By abusing document's event feature in LibreOffice and the LibreLogo script, an attacker can execute arbitrary python code from within a malicious document silently, without user warning. CVE-2019-9848 Exploits/Client Side Linux, Windows
LibreOffice LibreLogo Python Scripting Vulnerability Exploit v19_1 By abusing document's event feature in LibreOffice and the LibreLogo script, an attacker can execute arbitrary python code from within a malicious document silently, without user warning. CVE-2019-9848 Exploits/Client Side Linux, Windows
Microsoft Windows Remote Desktop Protocol BlueKeep Use After Free Exploit Update A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Bluekeep'.In this update more supported versions were added. CVE-2019-0708 Exploits/Remote Windows
LG Device Manager LHA Local Privilege Escalation Exploit The LHA.sys driver before 1.1.1811.2101 in LG Device Manager exposes functionality that allows low-privileged users to read and write arbitrary physical memory via specially crafted IOCTL requests and elevate system privileges. This occurs because the device object has an associated symbolic link and an open DACL CVE-2019-8372 Exploits/Local Windows
Microsoft Windows Remote Desktop Protocol BlueKeep Use After Free Exploit A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Bluekeep'. CVE-2019-0708 Exploits/Remote Windows
Atlassian Jira Template Injection Vulnerability Remote OS Command Injection Exploit Server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. If an SMTP server has been configured, then an unauthenticated user can execute code on vulnerable systems using the ContactAdministrators action if the "Contact Administrators Form" is enabled; or an authenticated user can execute code on vulnerable systems using the SendBulkMail action if the user has "JIRA Administrators" access. CVE-2019-11581 Exploits/OS Command Injection/Known Vulnerabilities Windows, Linux
Microsoft Windows LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. CVE-2019-0836 Exploits/Local Windows
Private Internet Access VPN Malicious OpenSSL Engine Privilege Escalation Exploit During startup the PIA Windows service(pia-service.exe) loads the OpenSSL library from C:\Program Files\Private Internet Access\libeay32.dll. This library attempts to load the C:\etc\ssl\openssl.cnf configuration file. By default on Windows systems, authenticated users can create directories under C:\. A low privileged user can create a openssl.cnf configuration file to load a malicious OpenSSL engine library resulting in the arbitrary code execution as SYSTEM when the service starts. CVE-2019-12572 Exploits/Local Windows
Cisco Data Center Network Manager Arbitrary File Upload Vulnerability Exploit Cisco Data Center Network Manager is vulnerable to an authenticated arbitrary file upload, which allows to upload a WAR file to the Apache Tomcat webapps directory. The Apache Tomcat webapps directory can be determined using a information disclosure vulnerability. Authentication can be bypassed on versions 10.4(2) and below. CVE-2019-1619 Exploits/Remote File Inclusion/Known Vulnerabilities Windows, Linux
Microsoft Windows Task Scheduler Elevation of Privilege Vulnerability Exploit An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. CVE-2019-1069 Exploits/Local Windows
Atlassian Crowd pdkinstall Plugin Install Vulnerability Exploit The pdkinstall development plugin is incorrectly enabled in release builds of Atlassian Crowd and Crowd Data Center. An attacker can leverage this vulnerability to install a malicious plugin and execute code in the system. CVE-2019-11580 Exploits/Remote File Inclusion/Known Vulnerabilities Windows, Linux
Microsoft Windows DHCP Server Heap Overflow Vulnerability DoS Update 2 A Heap Overflow vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP server. An attacker who successfully exploited the vulnerability could run arbitrary code on the DHCP server. This version improves the detection of the effectiveness in non-vulnerable targets. This update uses Impacket replacing Impacket 2014r1. CVE-2019-0626 Denial of Service/Remote Windows
Microsoft Windows Remote Desktop Protocol BlueKeep DoS A Denial of Service exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. CVE-2019-0708 Denial of Service/Remote Windows
VMware Workstation VMX Process COM Class Hijack Local Privilege Escalation Exploit VMware Workstation (15.x before 15.0.3, 14.x before 14.1.6) running on Windows does not handle COM classes appropriately. Successful exploitation of this issue may allow hijacking of COM classes used by the VMX process, on a Windows host, leading to elevation of privilege. CVE-2019-5512 Exploits/Local Windows
Oracle Weblogic Server AsyncResponseService Deserialization Vulnerability Remote Code Execution An unauthenticated attacker can send a malicious SOAP request to the interface WLS AsyncResponseService to execute code on the vulnerable host. The attacker must have network access to the Oracle Weblogic Server T3 interface. CVE-2019-2725 Exploits/OS Command Injection/Known Vulnerabilities Windows, Linux
Windows AppX Deployment Service AppXSVC Privilege Escalation Exploit An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. CVE-2019-0841 Exploits/Local Windows
Cisco Prime Infrastructure Health Monitor UploadServlet Remote JSP File Upload Vulnerability Exploit The TarArchive class blindly extracts tar archives without checking for directory traversals. An attacker can leverage this vulnerability to execute code in the system. CVE-2019-1821 Exploits/Remote File Inclusion/Known Vulnerabilities Linux
Microsoft Windows Remote Desktop Protocol BlueKeep Detector An unauthenticated attacker can connect to the target system using RDP and sends specially crafted requests to exploit the vulnerability. This module tries to verify if the vulnerability is present, without deploying an agent. CVE-2019-0708 Exploits/Remote Windows
Microsoft Windows LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Vulnerability Exploit An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. CVE-2019-0730 Exploits/Local Windows
Panda Antivirus AgentSvc Local Privilege Escalation Exploit The vulnerable is a Local Privilege Escalation in AgentSvc.exe. This service creates a global section object and a corresponding global event that is signaled whenever a process that writes to the shared memory wants the data to be processed by the service. The vulnerability lies in the weak permissions that are affected to both these objects allowing "Everyone" including unprivileged users to manipulate the shared memory and the event. CVE-2019-12042 Exploits/Local Windows
XMPlay M3U Files Buffer Overflow Exploit XMPlay 3.8.3 allows remote attackers to execute arbitrary code via a crafted http:// URL in a .m3u file. CVE-2018-19357 Exploits/Client Side Windows
Microsoft Windows DHCP Client Integer Underflow DoS The specific flaw exists within the DHCP Client service. A crafted DHCP packet can trigger an integer underflow before writing to memory. CVE-2019-0726 Denial of Service/Remote Windows
Sophos SafeGuard Enterprise Arbitrary Write SGStDrvm Local Privilege Escalation Exploit Update Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via multiple IOCTLs. This update fixes an error in the injection. CVE-2018-6854 Exploits/Local Windows
Atlassian Confluence Widget Connector Macro Vulnerability Exploit Update The Widget Connector macro in Atlassian Confluence Server allows remote attackers to achieve path traversal and remote code execution via server-side template injection. This update adds support to control the FTP Server port number and socket timeout. CVE-2019-3396 Exploits/OS Command Injection/Known Vulnerabilities Windows, Linux
Dnsmasq Heap buffer Overflow DoS Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response. CVE-2017-14491 Denial of Service/Remote Linux
Microsoft Windows Win32k DestroyClass Vulnerability Exploit Update This update adds support for Windows 7 64-bit. CVE-2019-0623 Exploits/Local Windows
Atlassian Confluence Widget Connector Macro Vulnerability Exploit The Widget Connector macro in Atlassian Confluence Server allows remote attackers to achieve path traversal and remote code execution via server-side template injection. CVE-2019-3396 Exploits/OS Command Injection/Known Vulnerabilities Windows, Linux