Exploits and Security Updates to Core Impact Threat Intelligence

Exploits and Security Updates to Core Impact Threat Intelligence

When you buy Core Impact, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Use the controls below to navigate Core Impact exploits and other modules.

Title Description Vulnerabilty Category Platform
Microsoft Windows SMB Remote Code Execution (MS17-010) Detector This module detects if MS17-010 is whether patched or not in a remote host. CVE-2017-0143 Exploits/Remote Windows
Trend Micro Threat Discovery Appliance admin_sys_time.cgi Remote Command Execution Exploit This module exploits two vulnerabilities in Trend Micro Threat Discovery Appliance. The first is an authentication bypass vulnerability via a file delete in logoff.cgi which resets the admin password back to 'admin' upon a reboot. This is useful if the password for the admin user is unknown. The second is an authenticated command injection flaw using the timezone parameter in the admin_sys_time.cgi interface. CVE-2016-7547 Exploits/Remote Code Execution Linux
Microsoft Windows OLE Package Manager Code Execution Exploit (MS14-064) Update Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object, as exploited in the wild in October 2014 with a crafted PowerPoint document. This update fixes agent size problems. CVE-2014-6352 Exploits/Client Side Windows
HPE Intelligent Management Center Java RMI Registry Deserialization Vulnerability Remote Code Execution Exploit HPE Intelligent Management Center is prone to a remote vulnerability that allows attackers to take advantage of an insecure deployment of the RMI Registry service used to manage and monitor the Java Virtual Machine. CVE-2017-5792 Exploits/Remote Windows
PHPMailer Remote Command Execution Exploit Update PHPMailer is prone to a abuse the mailSend function. This vulnerability allows remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property. This updates adds x86/x64 and HTTP/HTTPS Channel Support. CVE-2016-10033 Exploits/OS Command Injection/Known Vulnerabilities Linux
PHPMailer Remote Command Execution Exploit Update 2 PHPMailer is prone to a abuse the mailSend function. This vulnerability allows remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property. This fixes a small try/catch exception error. CVE-2016-10033 Exploits/OS Command Injection/Known Vulnerabilities Linux
Boonex Dolphin PHP File Upload Remote Code Execution Exploit Authentication bypass and upload of file with dangerous type in Boonex Dolphin <= 7.3.2 allows to remote unauthenticated attackers to affect integrity and availability via PHP remote file inclusion. NOCVE-9999-85482 Exploits/Remote File Inclusion/Known Vulnerabilities none
IIS WebDav ScStoragePathFromUrl Remote Code Execution Exploit Update A buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016. This update adds support for "Connect to" agent connection method and more supported platforms. CVE-2017-7269 Exploits/Remote Windows
Sync Breeze Enterprise GET Buffer Overflow Exploit Sync Breeze Enterprise is prone to a buffer overflow when handling an overly long HTTP GET request packet. NOCVE-9999-86102 Exploits/Remote Windows
3S-Smart Software Solutions GmbH CODESYS Web Server Upload Restricted File and Buffer Overflow Exploit A specially crafted web server request may allow the upload of arbitrary files to the CODESYS Web Server without authorization which may allow remote code execution. A malicious user could overflow a buffer by providing overly long strings to functions that handle the XML. Because the function does not verify string size before copying to memory, the attacker may then be able to crash the application or run arbitrary code. CVE-2017-6027 Exploits/Remote Windows
IIS WebDav ScStoragePathFromUrl Remote Code Execution Exploit A buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016. CVE-2017-7269 Exploits/Remote Windows
Micro Focus Rumba WdMacCtl ActiveX Exploit Micro Focus Rumba is prone to buffer overflow when PlayMacro() within WdMacCtl.ocx is used with an overly long MacroName argument. CVE-2016-5228 Exploits/Client Side Windows
Sophos Web Appliance MgrReport blocking Vulnerablity Remote Code Execution Exploit A vulnerability exists in the MgrReport.php (/controllers/MgrReport.php) component responsible for blocking and unblocking IP addresses from accessing the device. By abusing the blockip variable, an attacker can achieve remote code execution. CVE-2016-9553 Exploits/Remote Linux
CyberGhost CG6Service Service SetPeLauncherState Vulnerability Local Privilege Escalation Exploit The CG6Service Service in CyberGhost has the SetPeLauncherState method which allows a user to launch a debugger automatically for a determined process. This can be abused by an attacker to gain SYSTEM privileges by attaching to a SYSTEM process. NOCVE-9999-85362 Exploits/Local Windows
Ichitaro Office Excel File Heap Overflow Exploit This vulnerability revolves around an unchecked integer underflow of the size of a record of type 0x3c, producing a heap overflow, within a Workbook stream in an XLS file handled by Ichitaro. CVE-2017-2790 Exploits/Client Side Windows
Apache Struts 2 Multipart File Upload Remote Code Execution Exploit Update Remote Code Execution when performing file upload based on Jakarta Multipart parser. This update adds support to Linux x86_64 distributions CVE-2017-5638 Exploits/OS Command Injection/Known Vulnerabilities Linux
PHPMailer Remote Command Execution Exploit PHPMailer is prone to a abuse the mailSend function. This vulnerability allows remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property. CVE-2016-10033 Exploits/OS Command Injection/Known Vulnerabilities Linux
Disk Sorter Enterprise Login Buffer Overflow Exploit Disk Savvy server is prone to a buffer-overflow vulnerability when handling a crafted GET request, this can trigger an overflow in a finite-sized internal memory buffer, and install an agent with SYSTEM privileges. NOCVE-9999-84592 Exploits/Remote Windows
Apache Struts 2 Multipart File Upload Remote Code Execution Exploit Remote Code Execution when performing file upload based on Jakarta Multipart parser. CVE-2017-5638 Exploits/OS Command Injection/Known Vulnerabilities Linux
Sparklabs Viscosity Config Path Privilege Escalation Viscosity for Windows suffers from a privilege escalation vulnerability. By abusing the named pipe configuration channel between the client and the underlying service, a local attacker can gain SYSTEM privileges. NOCVE-9999-84440 Exploits/Local Windows
VIPA Controls WinPLC7 Buffer Overflow Exploit A stack-based buffer overflow vulnerability has been identified, where an attacker with a specially crafted packet could overflow the fixed length buffer. This could allow remote code execution. CVE-2017-5177 Exploits/Remote Windows
ConQuest DICOM Server Buffer Overflow Exploit The vulnerability is caused due to the usage of vulnerable collection of libraries that are part of DCMTK Toolkit, specifically the parser for the DICOM Upper Layer Protocol or DUL. Buffer overflow/underflow can be triggered when sending and processing wrong length of ACSE data structure received over the network by the DICOM Store-SCP service. NOCVE-9999-84105 Exploits/Remote Windows
Jenkins LDAP Java Library Deserialization Vulnerability Remote Code Execution Exploit An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java object to the Jenkins CLI, making Jenkins connect to an attacker-controlled LDAP server, which in turn can send a serialized payload leading to code execution, bypassing existing protection mechanisms. CVE-2016-9299 Exploits/Remote Windows, Linux
Microsoft Windows Win32k Privilege Escalation Exploit (MS16-135) Update 2 This module exploits a vulnerability in win32k.sys. By forcing an invalid combination of window style and window menu a local attacker can trigger a kernel arbitrary write and elevate privileges. This update adds support to Windows 2008 (32 and 64 bits) and Windows 2008 R2 (64 bits) CVE-2016-7255 Exploits/Local Windows
DiskSavvy Enterprise GET Buffer Overflow Exploit This module exploits a stack-based buffer overflow vulnerability in the web interface of DiskSavvy Enterprise caused by improper bounds checking of the request path in HTTP GET requests sent to the built-in web server. NOCVE-9999-83883 Exploits/Remote Windows
Dup Scout Enterprise Login Buffer Overflow Exploit This module exploits a stack-based buffer overflow vulnerability in the web interface of Dup Scout Enterprise caused by improper bounds checking on the login process sent to the built-in web server. NOCVE-9999-84008 Exploits/Remote Windows
WebEx Extension Remote Command Execution Cisco WebEx extension for Chrome includes an OS command injection vulnerability. This module serves a specially crafted web page using HTTPS. If a vulnerable version of the extension is installed and the web browser connects to Impact's web server, this module will deploys an OS agent. NOCVE-9999-83345 Exploits/Client Side Windows
Mozilla Firefox Use-after-free DOM and Audio Elements Exploit Use-after-free while manipulating DOM events and removing audio elements due to errors in the handling of node adoption. CVE-2016-9899 Exploits/Client Side Windows
Microsoft Windows Win32k Empty PFB File Exploit (MS16-151) This module exploits a vulnerability in win32k.sys by loading a Printer Font Metric (PFM) file associated to an empty Printer Font Binary (PFB) file. CVE-2016-7259 Exploits/Local Windows
Microsoft Windows LSASS Memory Corruption DoS (MS17-004) This module exploits an exceptional condition in "lsasrv.dll" by sending a crafted "Session Setup Request" SMBv1 or SMBv2 packet that is affected during the NTML Auth message. CVE-2017-0004 Denial of Service/Remote Windows