Core Impact Security and Penetration Testing Updates

Core Impact Threat Intelligence Exploits, Security and Penetration Testing Updates

When you buy Core Impact, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Use the controls below to navigate Core Impact exploits and other modules.

Title Description Vulnerabilty Category Platform
HPE iMC WebDMDebugServlet Java Deserialization Vulnerability Remote Code Execution Exploit HPE Intelligent Management Center is prone to a remote vulnerability that allows attackers to take advantage of an improper validation of user-supplied data, which can result in deserialization of untrusted data in WebDMDebugServlet. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM. CVE-2017-12557 Exploits/OS Command Injection/Known Vulnerabilities Windows
Cisco WebEx ARF File Binary Planting Exploit The specific flaw exists within the processing of ARF files. While opening an ARF file, WebEx Network Recording Player loads a DLL from an unqualified path. An attacker can leverage this vulnerability to execute code under the context of the current process. CVE-2018-0104 Exploits/Client Side Windows
WECON LeviStudio HMI Editor Buffer Overflow Exploit Update Multiple stack-based buffer overflow vulnerabilities have been identified in which the application does not verify string size before copying to memory, the attacker may then be able to crash the application or run arbitrary code. This update adds support for the new software version and a new CVE. CVE-2017-13999 Exploits/Client Side Windows
Sysgauge Server Unauthenticated Remote Buffer Overflow Exploit The vulnerability is a buffer overflow when parsing a crafted package to PORT 9221. CVE-2018-5359 Exploits/Remote Windows
Linux waitid Privilege Escalation Exploit Update The waitid implementation in upstream kernels did not restrict the target destination to copy information results. This can allow local users to write to otherwise protected kernel memory, which can lead to privilege escalation. This update fixes the way non-vulnerable targets are handled CVE-2017-5123 Exploits/Local Linux
GoAhead WebServer Remote Code Execution Exploit Embedthis GoAhead before 3.6.5 and after 2.5.0 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0. CVE-2017-17562 Exploits/Remote Linux
Meltdown Checker (CVE-2017-5154) This module performs a local check in order to detect if the target is vulnerable to CVE 2017-5154 (aka Meltdown). CVE-2017-5754 Exploits/Tools Linux
AllMediaServer HTTP Request Buffer Overflow Exploit AllMediaServer is prone to a buffer overflow when handling specially crafted HTTP request packets. NOCVE-9999-100718 Exploits/Remote Windows
ASX to MP3 converter ASX Buffer Overflow Exploit A Buffer Overflow exist in ASX to MP3 when parsing .ASX files. The vulnerability is caused due to a boundary error when handling a crafted .ASX files. CVE-2017-15083 Exploits/Client Side Windows
Advantech WebAccess Webvrpcs Service DrawSrv Untrusted Pointer Dereference Exploit The specific flaw exists within the implementation of the 0x2723 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this functionality to execute code under the context of Administrator. CVE-2017-12719 Exploits/Remote Windows
Linux waitid Privilege Escalation Exploit The waitid implementation in upstream kernels did not restrict the target destination to copy information results. This can allow local users to write to otherwise protected kernel memory, which can lead to privilege escalation. CVE-2017-5123 Exploits/Local Linux
pfSense system groupmanager Command Execution Exploit This module exploits a post authentication vulnerability in pfSense by abusing the system_groupmanager.php page which allows users to get Code Execution. NOCVE-9999-99510 Exploits/OS Command Injection/Known Vulnerabilities FreeBSD
IKARUS anti.virus ntguard_x64 Local Privilege Escalation This vulnerability allows local attackers to escalate privileges on vulnerable installations of IKARUS anti.virus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the processing of crafted IOCTL 0x8300000c by the ntguard_x64.sys kernel driver. The issue lies in the failure to properly validate user-supplied data which can result in an out-of-bounds write condition. An attacker can leverage this vulnerability to elevate privileges in context of kernel. CVE-2017-14961 Exploits/Local Windows
TrendMicro Officescan Widget Remote Command Execution Exploit TrendMicro is prone to an abuse in the talker.php function to get authentication bypass, combined with the mod TMCSS user-supplied unvalidated input before using it to execute a system calls leads us to execute arbitrary code. CVE-2017-11394 Exploits/OS Command Injection/Known Vulnerabilities Windows
DotCMS ajax_file_upload Arbitrary File Upload Vulnerability Exploit This module exploits an arbitrary file upload in DotCMS to install an agent. NOCVE-9999-97138 Exploits/Remote File Inclusion/Known Vulnerabilities Windows, Linux
REDDOXX Appliance ExecuteDiag Remote Command Injection Exploit This module exploits a command injection vulnerability in REDDOXX Appliance to install an agent. NOCVE-9999-98541 Exploits/OS Command Injection/Known Vulnerabilities Linux
Jungo DriverWizard WinDriver Kernel Out-of-Bounds Write Privilege Escalation Exploit Update This vulnerability allows local attackers to escalate privileges on vulnerable installations of Jungo WinDriver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the processing of IOCTL 0x953824a7 by the windrvr12xx kernel driver. The issue lies in the failure to properly validate user-supplied data which can result in an out-of-bounds write condition. An attacker can leverage this vulnerability to execute arbitrary code under the context of kernel. CVE-2017-14075 Exploits/Local Windows
Dup Scout Enterprise Username Buffer Overflow Exploit Dup Scout is prone to a buffer overflow when handling an overly long username. NOCVE-9999-98891 Exploits/Remote Windows
Microsoft Office Memory Corruption Exploit (CVE-2017-11882) A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. CVE-2017-11882 Exploits/Client Side Windows
NVIDIA DxgDdiEscape Handler Privilege Escalation Exploit Update NVIDIA Windows GPU Display Driver R340 before 342.00 and R375 before 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape ID 0x600000D where a value passed from a user to the driver is used without validation leading to escalation of privileges. This update add reliability and speed to the attack. CVE-2016-7387 Exploits/Local Windows
Trend Micro Mobile Security for Enterprise upload_img_file Arbitrary File Upload Vulnerability Exploit This module exploits an arbitrary file upload in Trend Micro Mobile Security for Enterprise to install an agent. CVE-2017-14079 Exploits/Remote File Inclusion/Known Vulnerabilities Windows
Microsoft Office Memory Corruption Exploit (CVE-2017-11826) A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. CVE-2017-11826 Exploits/Client Side Windows
WECON LeviStudio HMI Editor Buffer Overflow Exploit Multiple stack-based buffer overflow vulnerabilities have been identified in which the application does not verify string size before copying to memory, the attacker may then be able to crash the application or run arbitrary code. CVE-2017-13999 Exploits/Client Side Windows
CyberGhost CG6Service Service SetPeLauncherState Vulnerability Local Privilege Escalation Exploit Update The CG6Service Service in CyberGhost has the SetPeLauncherState method which allows a user to launch a debugger automatically for a determined process. This can be abused by an attacker to gain SYSTEM privileges by attaching to a SYSTEM process. This update fixes a minor bug. NOCVE-9999-85362 Exploits/Local Windows
Adobe ColdFusion Java JMX-RMI Remote Code Execution Exploit Adobe ColdFusion is prone to a remote vulnerability that allows attackers to take advantage of an insecure deployment of the JMX/RMI service used to manage and monitor the Java Virtual Machine. CVE-2017-11283 Exploits/Remote Windows
VX Search Enterprise POST Buffer Overflow Exploit VX Search Enterprise is prone to a buffer overflow via an empty POST request to a long URI beginning with a /../ substring. CVE-2017-15220 Exploits/Remote Windows
Lepide Auditor Suite createdb Web Console Database Injection Remote Code Execution Vulnerability Exploit The application allows an attacker to specify a server to perform authentication. That server also allows to execute controlled SQL directly against the database. This module abuses of the previous vulnerabilities in order execute an agent as SYSTEM. NOCVE-9999-96866 Exploits/Remote Windows
EFS Chat Server POST Buffer Overflow Exploit Username parameter in Registeration page 'register.ghp' is prone to a stack-based buffer-overflow vulnerability. Application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. NOCVE-9999-92479 Exploits/Remote Windows
Jungo DriverWizard WinDriver Kernel Out-of-Bounds Write Privilege Escalation Exploit This vulnerability allows local attackers to escalate privileges on vulnerable installations of Jungo WinDriver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the processing of IOCTL 0x953824a7 by the windrvr12xx kernel driver. The issue lies in the failure to properly validate user-supplied data which can result in an out-of-bounds write condition. An attacker can leverage this vulnerability to execute arbitrary code under the context of kernel. CVE-2017-14075 Exploits/Local Windows
Apache Tomcat readonly Initialisation Parameter JSP Remote Code Execution Exploit Apache Tomcat allows the upload of JSP files to unauthenticated users via a specially crafted request when the readonly initialization parameter of the Default servlet is set to false. CVE-2017-12617 Exploits/Remote Windows, Linux