Core Impact Security and Penetration Testing Updates

Core Impact Threat Intelligence Exploits, Security and Penetration Testing Updates

We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Fill out the form to sign up for email updates

Use the controls below to navigate Core Impact exploits and other modules.

Title Description Vulnerabilty Category Platform
Cisco Data Center Network Manager Arbitrary File Upload Vulnerability Exploit Cisco Data Center Network Manager is vulnerable to an authenticated arbitrary file upload, which allows to upload a WAR file to the Apache Tomcat webapps directory. The Apache Tomcat webapps directory can be determined using a information disclosure vulnerability. Authentication can be bypassed on versions 10.4(2) and below. CVE-2019-1619 Exploits/Remote File Inclusion/Known Vulnerabilities Windows, Linux
Microsoft Windows Task Scheduler Elevation of Privilege Vulnerability Exploit An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. CVE-2019-1069 Exploits/Local Windows
Atlassian Crowd pdkinstall Plugin Install Vulnerability Exploit The pdkinstall development plugin is incorrectly enabled in release builds of Atlassian Crowd and Crowd Data Center. An attacker can leverage this vulnerability to install a malicious plugin and execute code in the system. CVE-2019-11580 Exploits/Remote File Inclusion/Known Vulnerabilities Windows, Linux
Microsoft Windows DHCP Server Heap Overflow Vulnerability DoS Update 2 A Heap Overflow vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP server. An attacker who successfully exploited the vulnerability could run arbitrary code on the DHCP server. This version improves the detection of the effectiveness in non-vulnerable targets. This update uses Impacket replacing Impacket 2014r1. CVE-2019-0626 Denial of Service/Remote Windows
Microsoft Windows Remote Desktop Protocol BlueKeep DoS A Denial of Service exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. CVE-2019-0708 Denial of Service/Remote Windows
VMware Workstation VMX Process COM Class Hijack Local Privilege Escalation Exploit VMware Workstation (15.x before 15.0.3, 14.x before 14.1.6) running on Windows does not handle COM classes appropriately. Successful exploitation of this issue may allow hijacking of COM classes used by the VMX process, on a Windows host, leading to elevation of privilege. CVE-2019-5512 Exploits/Local Windows
Oracle Weblogic Server AsyncResponseService Deserialization Vulnerability Remote Code Execution An unauthenticated attacker can send a malicious SOAP request to the interface WLS AsyncResponseService to execute code on the vulnerable host. The attacker must have network access to the Oracle Weblogic Server T3 interface. CVE-2019-2725 Exploits/OS Command Injection/Known Vulnerabilities Windows, Linux
Windows AppX Deployment Service AppXSVC Privilege Escalation Exploit An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. CVE-2019-0841 Exploits/Local Windows
Cisco Prime Infrastructure Health Monitor UploadServlet Remote JSP File Upload Vulnerability Exploit The TarArchive class blindly extracts tar archives without checking for directory traversals. An attacker can leverage this vulnerability to execute code in the system. CVE-2019-1821 Exploits/Remote File Inclusion/Known Vulnerabilities Linux
Microsoft Windows Remote Desktop Protocol BlueKeep Detector An unauthenticated attacker can connect to the target system using RDP and sends specially crafted requests to exploit the vulnerability. This module tries to verify if the vulnerability is present, without deploying an agent. CVE-2019-0708 Exploits/Remote Windows
Microsoft Windows LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Vulnerability Exploit An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. CVE-2019-0730 Exploits/Local Windows
Panda Antivirus AgentSvc Local Privilege Escalation Exploit The vulnerable is a Local Privilege Escalation in AgentSvc.exe. This service creates a global section object and a corresponding global event that is signaled whenever a process that writes to the shared memory wants the data to be processed by the service. The vulnerability lies in the weak permissions that are affected to both these objects allowing "Everyone" including unprivileged users to manipulate the shared memory and the event. CVE-2019-12042 Exploits/Local Windows
XMPlay M3U Files Buffer Overflow Exploit XMPlay 3.8.3 allows remote attackers to execute arbitrary code via a crafted http:// URL in a .m3u file. CVE-2018-19357 Exploits/Client Side Windows
Microsoft Windows DHCP Client Integer Underflow DoS The specific flaw exists within the DHCP Client service. A crafted DHCP packet can trigger an integer underflow before writing to memory. CVE-2019-0726 Denial of Service/Remote Windows
Sophos SafeGuard Enterprise Arbitrary Write SGStDrvm Local Privilege Escalation Exploit Update Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via multiple IOCTLs. This update fixes an error in the injection. CVE-2018-6854 Exploits/Local Windows
Atlassian Confluence Widget Connector Macro Vulnerability Exploit Update The Widget Connector macro in Atlassian Confluence Server allows remote attackers to achieve path traversal and remote code execution via server-side template injection. This update adds support to control the FTP Server port number and socket timeout. CVE-2019-3396 Exploits/OS Command Injection/Known Vulnerabilities Windows, Linux
Dnsmasq Heap buffer Overflow DoS Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response. CVE-2017-14491 Denial of Service/Remote Linux
Microsoft Windows Win32k DestroyClass Vulnerability Exploit Update This update adds support for Windows 7 64-bit. CVE-2019-0623 Exploits/Local Windows
Atlassian Confluence Widget Connector Macro Vulnerability Exploit The Widget Connector macro in Atlassian Confluence Server allows remote attackers to achieve path traversal and remote code execution via server-side template injection. CVE-2019-3396 Exploits/OS Command Injection/Known Vulnerabilities Windows, Linux
Dnsmasq Integer Underflow DoS In dnsmasq before 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero's (0xffffffffffffffff in 64 bit platforms), making dnsmasq crash. CVE-2017-13704 Denial of Service/Remote Linux
Microsoft Windows Win32k DestroyClass Vulnerability Exploit An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. CVE-2019-0623 Exploits/Local Windows
Microsoft Windows DCOM-RPC NTLM Reflection Elevation of Privilege Exploit Update This update improves the reliability by handling scenarios where the attack cannot be performed. CVE-2016-3225 Exploits/Local Windows
Microsoft Windows Shell Remote Code Execution Vulnerability Exploit (CVE-2018-8495) Microsoft Windows Shell does not properly sanitize special characters in a URI, allowing the opening a dangerous files. An attacker can leverage this vulnerability to execute code in the context of the current user. CVE-2018-8495 Exploits/Client Side Windows
Apache Tika Server OS Command Injection Exploit An OS Command Injection Vulnerability was found in Apache Tika Server 1.11<= Version <=1.17. The vulnerability is due to an error in the vulnerable application when handling a maliciously crafted request. CVE-2018-1335 Exploits/Remote Code Execution Windows
Foxit Reader UAF Remote Execution Exploit A Buffer Overflow exists when parsing .PDF files. The vulnerability is caused due to a boundary error when handling a crafted .PDF files. CVE-2018-9948 Exploits/Client Side Windows
Free MP3 CD Ripper Buffer Overflow SEH Exploit Update A Buffer Overflow exists when parsing .mp3/wma files. The vulnerability is caused due to a boundary error when handling a crafted .mp3/wma files. CVE-2019-9767 Exploits/Client Side Windows
Microsoft Windows Win32k UaF xxxDestroyWindow Local Privilege Escalation Exploit An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. CVE-2018-8453 Exploits/Local Windows
Microsoft Windows DHCP Server Heap Overflow Vulnerability DoS Update A Heap Overflow vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP server. An attacker who successfully exploited the vulnerability could run arbitrary code on the DHCP server. This version improves the detection of the effectiveness in non-vulnerable targets. CVE-2019-0626 Denial of Service/Remote Windows
MS17-010 exploit updates This update adds support for new platforms to the MS17-010 exploitation such as Windows 7 Embedded Standard edition, and also 32 bits targets. CVE-2017-0143 Exploits/Remote Windows
WinRAR ACE filename Absolute Path Extraction Vulnerability Exploit Path traversal vulnerability in WinRAR when crafting the filename field of the ACE format (in UNACEV2.dll). When the filename field is manipulated with specific patterns, the destination (extraction) folder is ignored, thus treating the filename as an absolute path. CVE-2018-20250 Exploits/Client Side Windows