Core Impact Pro Exploits and Security Updates

Core Impact Pro Exploits and Security Updates

When you buy Core Impact Pro, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact Pro. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact Pro keeps you there.

Use the controls below to navigate Core Impact exploits and other modules.

Title Description Vulnerabilty Category Platform
glibc getaddrinfo Buffer Overflow Verifier This module executes a program designed to check for a buffer overflow in glibc's getaddrinfo function. Multiple stack-based buffer overflows in the send_dg and send_vc functions in the libresolv library in the GNU C Library allow remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family. CVE-2015-7547 Exploits/Tools Linux
Image Magick Command Injection Exploit Insufficient input validation in ImageMagick can lead to code execution when processing with certain types of files. This update introduces a module that generates an MVG format file that, when manipulated by the vulnerable versions of ImageMagick tools, deploys an agent in the supported systems. CVE-2016-3714 Exploits/Tools Linux
OpenSSH xauth Command Injection Vulnerability Exploit An authenticated user may inject arbitrary xauth commands by sending an x11 channel request that includes a newline character in the x11 cookie. The newline acts as a command separator to the xauth binary. The injected xauth commands are performed with the effective permissions of the logged in user. This attack requires the server to have 'X11Forwarding yes' enabled. This module injects source xauth command to retrieve arbitrary files. CVE-2016-3115 Exploits/Remote File Disclosure Linux
Reprise License Manager edit_lf_process Write Arbitrary Files Exploit Update 3 The specific flaw exists within the edit_lf_process resource of the Reprise License Manager service. The issue lies in the ability to write arbitrary files with controlled data. An attacker could leverage this vulnerability to execute arbitrary code under the context of SYSTEM. This update introduces more accurate information about vulnerable targets. NOCVE-9999-74481 Exploits/Remote Windows
Reprise License Manager activate_doit Command actserver Parameter Buffer Overflow Exploit Update 2 The specific flaw exists within the activate_doit function of the service. The issue lies in the handling of the server parameter which can result in overflowing a stack-based buffer. This update introduces more accurate information about vulnerable targets. CVE-2015-6946 Exploits/Remote Windows
Atlassian Bamboo commons-collections Java Library Deserialization Vulnerability Remote Code Execution Exploit Atlassian Bamboo is prone to a remote vulnerability that allows attackers to take advantage of a deserialization vulnerability present in the commons-collections Java library. By exploiting known methods, it is possible to remotely load a InvokerTransformer Java class, which allows the execution of system commands. CVE-2015-6576 Exploits/Remote Windows
TrendMicro node.js HTTP Server Remote Code Execution Exploit The Password Manager component installed by various Trend Micro products runs a Node.js HTTP server by default. This web server opens multiple HTTP RPC ports for handling API requests. For example, the openUrlInDefaultBrowser API function, which internally maps to a ShellExecute function call, allows and attacker to execute arbitrary commands on localhost without the need of any type of credentials. NOCVE-9999-74958 Exploits/Client Side Windows
Jenkins XStream Java Library Deserialization Vulnerability Remote Code Execution Exploit Jenkins is prone to a remote vulnerability due to deserialization of untrusted inputs, allowing attackers to instantiate arbitrary Java objects leading to remote code execution. There are several API endpoints that allow low-privilege users to POST XML files that then get deserialized by Jenkins. Maliciously crafted XML files sent to these API endpoints could result in arbitrary code execution. CVE-2016-0792 Exploits/Remote Windows, Linux
Jenkins XStream Java Library Deserialization Vulnerability Remote Code Execution Exploit Update Jenkins is prone to a remote vulnerability due to deserialization of untrusted inputs, allowing attackers to instantiate arbitrary Java objects leading to remote code execution. There are several API endpoints that allow low-privilege users to POST XML files that then get deserialized by Jenkins. Maliciously crafted XML files sent to these API endpoints could result in arbitrary code execution. This update adds support for HTTPS and IPv6. It also allows to change the application root path. CVE-2016-0792 Exploits/Remote Windows, Linux
Apple Mac OS X XPC Entitlements Local Privilege Escalation Exploit The Admin framework in Apple OS X contains a hidden backdoor API to gain root privileges. A local user can exploit this flaw in the checking of XPC entitlements. CVE-2015-1130 Exploits/Local Mac OS X
Microsoft Windows Secondary Logon Vulnerability Exploit (MS16-032) This module exploits a vulnerability in "Windows Secondary Logon Service" when it fails to properly manage request handles in memory. CVE-2016-0099 Exploits/Local Windows
Microsoft Internet Explorer VBScript Filter Type Confusion Exploit (MS15-106) The Filter function of the VBScript engine in Microsoft Internet Explorer is prone to a type confusion vulnerability when processing specially crafted parameters. This vulnerability allows attackers to execute arbitrary code on vulnerable machines by enticing unsuspecting users to visit a specially crafted website. CVE-2015-6053 Exploits/Client Side Windows
Exim perl_startup Configuration Variable Local Privilege Escalation Exploit Exim installations compiled with Perl support do not perform sanitation of the environment before loading a perl script defined with perl_startup setting in exim config file. This can be exploited by malicious local attackers to gain root privileges. CVE-2016-1531 Exploits/Local Linux
FreeBSD Kernel amd64_set_ldt Heap Overflow DoS The amd64_set_ldt() function in sys/amd64/amd64/sys_machdep.c in the FreeBSD kernel code is prone to an integer signedness error when processing a system call with specially crafted parameters originated from user space. This issue ultimately leads to a kernel heap overflow, which can be used by unprivileged local attackers to cause a kernel panic and crash the machine. CVE-2016-1885 Denial of Service/Local FreeBSD
Advantech WebAccess webvrpcs Service BwWebSvc ProjectName sprintf Buffer Overflow Exploit The specific flaw exists within the implementation of the 0x13C83 IOCTL in the BwOpcTool subsystem. A stack-based buffer overflow vulnerability exists in a call to memcpy using the ProjectName parameter. An attacker can use this vulnerability to execute arbitrary code in the context of an administrator of the system. NOCVE-9999-74956 Exploits/Remote Windows
NVIDIA Stereoscopic 3D Driver Service Privilege Escalation This module will exploit a vulnerability in the NVIDIA Stereoscopic 3D Driver Service. It will wait for users to login on the target system, installing agents for every user, until being able to install an agent for a user in the Built In Administrators group. CVE-2015-7865 Exploits/Local Windows
Borland AccuRev Reprise License Server activate_doit Command actserver Parameter Buffer Overflow Exploit The specific flaw exists within the activate_doit function of the service. The issue lies in the handling of the actserver parameter which can result in overflowing a stack-based buffer. CVE-2015-6946 Exploits/Remote Windows
Easy File Sharing Web Server GET Request Exploit Easy File Sharing is prone to a buffer-overflow when handling a specially crafted GET request. NOCVE-9999-74961 Exploits/Remote Windows
Netgear ProSafe Network Management System Arbitrary File Upload Vulnerability Exploit A vulnerability exists in the FileUpload2Controller servlet. This servlet allows unauthenticated file uploads. By uploading a JSP file, an attacker can achieve remote code execution. CVE-2016-1524 Exploits/Remote Windows
Advantech WebAccess webvrpcs Service DrawSrv TagGroup Buffer Overflow Exploit The specific flaw exists within the implementation of the 0x280A IOCTL in the DrawSrv subsystem. A stack-based buffer overflow vulnerability exists in a call to strcpy. An attacker can use this vulnerability to execute arbitrary code in the context of an administrator of the system. CVE-2016-0856 Exploits/Remote Windows
Linux Kernel join_session_keyring Reference Counting Privilege Escalation Exploit The join_session_keyring() function in security/keys/process_keys.c in the Linux kernel is prone to a reference counter overflow that occurs when a process repeatedly tries to join an already existing keyring. This vulnerability can be leveraged by local unprivileged attackers to gain root privileges on the affected systems. CVE-2016-0728 Exploits/Local Linux
Apple Mac OS X DYLD_PRINT_TO_FILE Privilege Escalation Exploit This module exploits a vulnerability present in Mac OS X. dyld in Apple OS X before 10.10.5 does not properly validate pathnames in the environment, which allows local users to gain root privileges via the DYLD_PRINT_TO_FILE environment variable. CVE-2015-3760 Exploits/Local Mac OS X
Jenkins Default Configuration Remote Code Execution Exploit Update This module exploits a Jenkins command injection in order to install an agent. This update adds support for Windows and Linux platforms, and HTTPS support. NOCVE-9999-74942 Exploits/Remote Windows, Linux
Oracle Application Testing Suite UploadServlet Servlet Remote Code Execution Exploit A vulnerability exists in the UploadServlet servlet. By providing a filename header containing a directory traversal, an attacker can upload a file to an arbitrary location on the system. This module abuses the auto deploy feature in the server in order to achieve remote code execution. CVE-2016-0490 Exploits/Remote Windows
Oracle Application Testing Suite UploadFileAction Servlet Remote Code Execution Exploit A vulnerability exists in the UploadFileAction servlet. By providing a fileType parameter of "*" to the UploadFileUpload page, an attacker can upload a file to an arbitrary location on the system. This module abuses the auto deploy feature in the server in order to achieve remote code execution. Also, this module makes use of an authentication bypass vulnerability to perform the attack. CVE-2016-0491 Exploits/Remote Windows
Microsoft Windows COM Object Cpfilters dll based Binary Planting Exploit Update (MS16-014) This module exploits a COM Server-based Binary Planting vulnerability on Microsoft Windows using a word document to deploy an agent. This update adds other vulnerable dlls to the exploitation and other platforms and architectures. CVE-2016-0041 Exploits/Client Side Windows
Adobe Acrobat Reader armsvc Service Privilege Escalation Exploit Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allow attackers to bypass intended access restrictions and perform a transition from Low Integrity to Medium Integrity via unspecified vectors, a different vulnerability than CVE-2015-4446 and CVE-2015-5106. CVE-2015-5090 Exploits/Local Windows
Spring Boot Default Error Page Expression Language Injection Exploit Spring Boot Framework 1.2.7 provides a default error page (also known as "Whitelabel Error Page"), that's prone to Spring Expression Language injection when the type of a parameter expected is not expected to be a string but a string is provided. Applications based on Spring Boot that don't deactivate the feature, or customize it in such a way as to stop the injection, are thus susceptible to execution of some Java statements and, in particular, to OS command injections. This module checks all the parameters in the given pages and, if at least one parameter is vulnerable to the injection, installs an OS Agent. CVE-2013-1966 Exploits/OS Command Injection/Known Vulnerabilities Windows, Linux, Solaris
Microsoft Office COM Object els.dll based Binary Planting Exploit (MS15-132) Update This module exploits a COM Server-based Binary Planting vulnerability on Microsoft Word to deploy an agent. This version adds wow64 support. CVE-2015-6128 Exploits/Client Side Windows
Microsoft Windows COM Object Cpfilters dll based Binary Planting Exploit (MS16-014) This module exploits a COM Server-based Binary Planting vulnerability on Microsoft Windows using a word document to deploy an agent. CVE-2016-0041 Exploits/Client Side Windows