Core Impact Security and Penetration Testing Updates

Core Impact Threat Intelligence Exploits, Security and Penetration Testing Updates

We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Fill out the form to sign up for email updates

Use the controls below to navigate Core Impact exploits and other modules.

Title Description Vulnerabilty Category Platform
AVEVA InduSoft Web Studio Remote Command Injection Exploit Unauthenticated remote command injection vulnerability in Indusoft Web Studio 8.1 SP2. The vulnerability is exercised via the custom remote agent protocol that is typically found on port 1234 or 51234. An attacker can issue a specially crafted command 66 which causes IWS to load a DB connection file off of a network share using SMB. The DB file can contain OS commands that will be executed at the privilege level used by IWS. CVE-2019-6545 Exploits/Remote Windows
Microsoft Windows Remote Desktop Protocol BlueKeep Use After Free Exploit Update 2 This update adds support for Windows 7 SP1 x64. CVE-2019-0708 Exploits/Remote Windows
SolarWinds Dameware Mini Remote Control Unauthenticated RCE Exploit The Solarwinds Dameware Mini Remote Client agent supports smart card authentication by default which allows a user to upload an executable to be executed on the DWRCS.exe host. An unauthenticated, remote attacker can request smart card login and upload and execute an arbitrary executable. CVE-2019-3980 Exploits/Remote Windows
rConfig ajaxServerSettingsChk and search_crud Remote OS Command Injection Exploit An unauthenticated OS command injection vulnerability in rConfig using the rootUname parameter present in ajaxServerSettingsChk.php allows an attacker to send a request that will attempt to execute OS commands with permissions of the rConfig process on the host system. Also, an authenticated OS command injection vulnerability using the catCommand parameter present in search.crud.php allows an attackers to do the same as previous, but credentials are required. CVE-2019-16662 Exploits/OS Command Injection/Known Vulnerabilities Linux
Apache Solr Velocity Template Remote OS Command Injection Exploit Update A vulnerability in the Apache Solr Velocity template allows unauthenticated attackers to execute arbitrary OS commands. This update adds automatic core name detection and newer supported versions. NOCVE-9999-127120 Exploits/OS Command Injection/Known Vulnerabilities Windows, Linux
Kibana Timelion Visualizer Remote Javascript OS Command Injection Exploit An arbitrary code execution vulnerability in the Kibana Timelion visualizer allows an attacker with access to the application to send a request that will attempt to execute javascript code with permissions of the Kibana process on the host system. CVE-2019-7609 Exploits/OS Command Injection/Known Vulnerabilities Linux
Apache Solr Velocity Template Remote OS Command Injection Exploit A vulnerability in the Apache Solr Velocity template allows unauthenticated attackers to execute arbitrary OS commands. NOCVE-9999-127120 Exploits/OS Command Injection/Known Vulnerabilities Windows, Linux
Linux Kernel libfutex Privilege Escalation Exploit Update This module has improvements for the Linux Kernel libfutex exploit. CVE-2014-3153 Exploits/Local Linux
Disk Pulse Enterprise Import Command Local Buffer Overflow Exploit A Buffer Overflow exists when parsing .XML files by Command Import. The vulnerability is caused due to a boundary error when handling a crafted .XML files. CVE-2017-7310 Exploits/Client Side Windows
Advantech WebAccess SCADA GetUserPasswd BwPAlarm Buffer Overflow Exploit The flaw exists in the GetUserPasswd function in BwPAlarm.dll due to improper validation of user-supplied data before copying the data to a fixed size stack-based buffer when processing an IOCTL 70603 RPC message. CVE-2018-18999 Exploits/Remote Windows
Sudo Root With User ID Local Privilege Escalation Exploit (CVE-2019-14287) This module exploits a flaw in the way sudo implemented running commands with arbitrary user ID. If a sudoers entry is written to allow the attacker to run a command as any user except root, this flaw can be used by the attacker to bypass that restriction. CVE-2019-14287 Exploits/Local Linux
FreeBSD IOCTL CDIOCREADSUBCHANNELSYSSPACE Local Privilege Escalation Exploit A bug in the cdrom driver allows users with read access to the cdrom device to arbitrarily overwrite kernel memory when media is present thereby allowing a malicious user in the operator group to gain root privileges. CVE-2019-5602 Exploits/Local FreeBSD
LibreOffice LibreLogo Python Global Event Scripting Vulnerability Exploit By abusing document's event feature in LibreOffice and the LibreLogo script, an attacker can execute arbitrary python code from within a malicious document silently, without user warning. This module performs a bypass of CVE-2019-9848 by using global script events. CVE-2019-9851 Exploits/Client Side Linux, Windows
Check Point Endpoint Security Initial Client Privilege Escalation Exploit Check Point Endpoint Security includes data security, network security, advanced threat prevention, forensics, and remote access VPN solutions. Some parts of the software run as a Windows service executed as ''NT AUTHORITY\SYSTEM,'' which provides it with very powerful permissions, this vulnerability can be exploited to achieve privilege escalation, gaining access with NT AUTHORITY\SYSTEM level privileges. CVE-2019-8461 Exploits/Local Windows
Microsoft Windows Win32k xxxMNOpenHierarchy Vulnerability Exploit v1 An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. CVE-2019-1132 Exploits/Local Windows
Fuji Electric Alpha5 Smart Loader Exploit Fuji Electric Alpha5 Smart Loader is prone to a buffer overflow when handling a specially crafted csp file. CVE-2018-14788 Exploits/Client Side Windows
Microsoft Internet Explorer VBScript UAF Exploit (2019) A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. NOCVE-9999-127115 Exploits/Client Side Windows
Adobe ColdFusion JNBridge Remote Code Execution Exploit Adobe ColdFusion is prone to a remote vulnerability that allows attackers to take advantage of an insecure deployment of the JNBridge protocol. CVE-2019-7839 Exploits/Remote Windows, Linux
Windows Win32k Elevation Of Privilege Exploit (CVE-2019-0803) An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. CVE-2019-0803 Exploits/Local Windows
Windows Win32k Elevation Of Privilege Exploit (CVE-2019-0803) 2 An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. CVE-2019-0803 Exploits/Local Windows
MAPLE Computer SNMP Administrator Exploit Maple Computer SNMP Administrator is prone to a buffer-overflow by sending a specially crafted packet with an overly long string on port 987. CVE-2019-13577 Exploits/Remote Windows
MAPLE Computer SNMP Administrator Exploit v19_1 Maple Computer SNMP Administrator is prone to a buffer-overflow by sending a specially crafted packet with an overly long string on port 987. CVE-2019-13577 Exploits/Remote Windows
LibreOffice LibreLogo Python Scripting Vulnerability Exploit By abusing document's event feature in LibreOffice and the LibreLogo script, an attacker can execute arbitrary python code from within a malicious document silently, without user warning. CVE-2019-9848 Exploits/Client Side Linux, Windows
LibreOffice LibreLogo Python Scripting Vulnerability Exploit v19_1 By abusing document's event feature in LibreOffice and the LibreLogo script, an attacker can execute arbitrary python code from within a malicious document silently, without user warning. CVE-2019-9848 Exploits/Client Side Linux, Windows
Microsoft Windows Remote Desktop Protocol BlueKeep Use After Free Exploit Update A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Bluekeep'.In this update more supported versions were added. CVE-2019-0708 Exploits/Remote Windows
LG Device Manager LHA Local Privilege Escalation Exploit The LHA.sys driver before 1.1.1811.2101 in LG Device Manager exposes functionality that allows low-privileged users to read and write arbitrary physical memory via specially crafted IOCTL requests and elevate system privileges. This occurs because the device object has an associated symbolic link and an open DACL CVE-2019-8372 Exploits/Local Windows
Microsoft Windows Remote Desktop Protocol BlueKeep Use After Free Exploit A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Bluekeep'. CVE-2019-0708 Exploits/Remote Windows
Atlassian Jira Template Injection Vulnerability Remote OS Command Injection Exploit Server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. If an SMTP server has been configured, then an unauthenticated user can execute code on vulnerable systems using the ContactAdministrators action if the "Contact Administrators Form" is enabled; or an authenticated user can execute code on vulnerable systems using the SendBulkMail action if the user has "JIRA Administrators" access. CVE-2019-11581 Exploits/OS Command Injection/Known Vulnerabilities Windows, Linux
Microsoft Windows LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. CVE-2019-0836 Exploits/Local Windows
Private Internet Access VPN Malicious OpenSSL Engine Privilege Escalation Exploit During startup the PIA Windows service(pia-service.exe) loads the OpenSSL library from C:\Program Files\Private Internet Access\libeay32.dll. This library attempts to load the C:\etc\ssl\openssl.cnf configuration file. By default on Windows systems, authenticated users can create directories under C:\. A low privileged user can create a openssl.cnf configuration file to load a malicious OpenSSL engine library resulting in the arbitrary code execution as SYSTEM when the service starts. CVE-2019-12572 Exploits/Local Windows