Core Impact Pro Exploits and Security Updates

Core Impact Pro Exploits and Security Updates

When you buy Core Impact Pro, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact Pro. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact Pro keeps you there.

Use the controls below to navigate Core Impact exploits and other modules.

Title Description Vulnerabilty Category Platform
VMware vCenter Server Java JMX-RMI Remote Code Execution Exploit VMware vCenter Server is prone to a remote vulnerability that allows attackers to take advantage of an insecure deployment of the JMX/RMI service used to manage and monitor the Java Virtual Machine. By exploiting known methods, it is possible to remotely load an MLet file from an attacker controlled web server that points at a, also controlled, jar file. CVE-2015-2342 Exploits/Remote Windows
SolarWinds Application Monitor TSUnicodeGraphEditorControl factory Buffer Overflow Exploit Update 2 The specific flaw exists within the 'factory' object's loadExtensionFactory method. The issue lies in a failure to validate the size of an attacker-supplied input before copying it into a fixed-size buffer on the stack. An attacker can leverage this vulnerability to execute code under the context of the current process. This version add x86_64 support and improves reliability. CVE-2015-1500 Exploits/Client Side Windows
Microsoft Windows Media Center MCL URL File Disclosure Exploit (MS15-134) Windows Media Center MCL files can specify a URL to be automatically loaded within Media Center. A specially crafted MCL file can trick Windows Media Center into rendering the very same MCL file as a local HTML file within the application's embedded web browser. This can be leveraged by an attacker to read and exfiltrate arbitrary files from a victim's local fileystem by convincing an unsuspecting user to open an MCL file. CVE-2015-6127 Exploits/Client Side Windows
Borland AccuRev Reprise License Server edit_lf_process Write Arbitrary Files Exploit Update 2 The specific flaw exists within the edit_lf_process resource of the AccuRev Reprise License Manager service. The issue lies in the ability to write arbitrary files with controlled data. An attacker could leverage this vulnerability to execute arbitrary code under the context of SYSTEM. This update introduces a number of improvements related to the architecture of the agent installed and scenarios where multiple targets are tested. This update adds reliability. NOCVE-9999-74481 Exploits/Remote Windows
Symantec Endpoint Protection Manager Java Library Deserialization Vulnerability Remote Code Execution Exploit Symantec Endpoint Protection Manager is prone to a remote vulnerability due to deserialization of untrusted inputs, allowing attackers to instantiate arbitrary Java objects leading to remote code execution. CVE-2015-6555 Exploits/Remote Windows
Oracle WebLogic Server commons-collections Java Library Deserialization Vulnerability Remote Code Execution Exploit Update Oracle WebLogic Server is prone to a remote vulnerability due to deserialization of untrusted inputs, allowing attackers to instantiate arbitrary Java objects leading to remote code execution. This update add proper CVE number and more supported platforms. CVE-2015-4852 Exploits/Remote Solaris, Windows, Linux
Kaspersky Antivirus ThinApp Parser Exploit Kaspersky Antivirus is prone to a buffer overflow when handling a specially crafted ThinApp compressed file. NOCVE-9999-74927 Exploits/Client Side Windows
Oracle WebLogic Server commons-collections Java Library Deserialization Vulnerability Remote Code Execution Exploit Oracle WebLogic Server is prone to a remote vulnerability due to deserialization of untrusted inputs, allowing attackers to instantiate arbitrary Java objects leading to remote code execution. CVE-2015-4852 Exploits/Remote Solaris, Windows, Linux
JBoss commons-collections Java Library Deserialization Vulnerability Remote Code Execution Exploit JBoss Application Server is prone to a remote vulnerability due to deserialization of untrusted inputs, allowing attackers to instantiate arbitrary Java objects leading to remote code execution. NOCVE-9999-74929 Exploits/Remote Code Execution Windows, Linux
Jenkins commons-collections Java Library Deserialization Vulnerability Remote Code Execution Exploit Jenkins is prone to a remote vulnerability due to deserialization of untrusted inputs, allowing attackers to instantiate arbitrary Java objects leading to remote code execution. NOCVE-9999-74930 Exploits/Remote Code Execution Windows, Linux
IBM WebSphere commons-collections Java Library Deserialization Vulnerability Remote Code Execution Exploit IBM WebSphere Application Server is prone to a remote vulnerability due to deserialization of untrusted inputs, allowing attackers to instantiate arbitrary java objects leading to remote code execution. NOCVE-9999-74928 Exploits/Remote Code Execution Windows
Moxa VPort SDK Plus ActiveX Exploit The specific flaw exists within the VPORTSDK.VPortSDKCtrl.1 ActiveX control. By passing an overly long string to the GetClientReg method's Name parameter. CVE-2015-0986 Exploits/Client Side Windows
HP LoadRunner Controller Scenario File Buffer Overflow Exploit The specific flaw exists within the handling of scenario files (.lrs). By manipulating a scenario file's values, an attacker can cause a fixed-length stack buffer to overflow. CVE-2015-5426 Exploits/Client Side Windows
ManageEngine EventLog Analyzer Exploit ManageEngine EventLog Analyzer is vulnerable to abuse a SQL query functionality that allows attackers to insert and export a crafted JSP using 'guest' credentials allowing us to install an agent. CVE-2015-7387 Exploits/Remote Windows
Borland AccuRev Reprise License Server edit_lf_process Write Arbitrary Files Exploit Update The specific flaw exists within the edit_lf_process resource of the AccuRev Reprise License Manager service. The issue lies in the ability to write arbitrary files with controlled data. An attacker could leverage this vulnerability to execute arbitrary code under the context of SYSTEM. This update introduces a number of improvements related to the architecture of the agent installed and scenarios where multiple targets are tested. NOCVE-9999-74481 Exploits/Remote Windows
Linux fusermount Environment Variable Privilege Escalation Exploit The 'fusermount' binary, part of the FUSE system in Linux, executes the /bin/mount binary with ruid set to 0 without clearing the environment variables provided by unprivileged users. This flaw can be leveraged by local unprivileged users to gain root privileges by leveraging the functionality provided by the LIBMOUNT_MTAB environment variable to overwrite an arbitrary file on the affected system. CVE-2015-3202 Exploits/Local Linux
Adobe Flash Player Exploits Improvements This update introduces variations in the SWF files of "Adobe Flash Player ByteArray valueOf Use-After-Free Exploit" and "Adobe Flash Player shared ByteArray Use-After-Free Exploit" modules to avoid antivirus signatures. CVE-2015-5119 Exploits/Client Side Windows
Symantec Endpoint Protection Kernel Pool Overflow Privilege Escalation Exploit Update Buffer overflow in the sysplant driver in Symantec Endpoint Protection (SEP) Client 11.x and 12.x before 12.1 RU4 MP1b, and Small Business Edition before SEP 12.1, allows local users to execute arbitrary code via a long argument to a 0x00222084 IOCTL call. CVE-2014-3434 Exploits/Local Windows
HP Client Automation Remote Code Execution Exploit This module exploits a command injection vulnerability in HP Client Automation. The flaw exists within the radexecd.exe component which listens by default on TCP port 3465. When handling a remote execution request the process does not properly authenticate the user issuing the request. The command to be executed is also not properly sanitized. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of SYSTEM. Authentication is not required to exploit this vulnerability. CVE-2015-1497 Exploits/Remote Windows, Mac OS X, Linux
ElasticSearch Search Groovy Sandbox Bypass Remote Execution Exploit A vulnerability in ElasticSearch versions 1.4.0 to 1.4.2 allows execution of unsandboxed Groovy code. This module installs an OS agent in vulnerable targets. CVE-2015-1427 Exploits/Remote Windows, Linux
Borland AccuRev Reprise License Server activate_doit Command actserver Parameter Buffer Overflow Exploit The specific flaw exists within the activate_doit function of the service. The issue lies in the handling of the actserver parameter which can result in overflowing a stack-based buffer. CVE-2015-6946 Exploits/Remote Windows
Microsoft Windows MS-DOS Device Name Privilege Escalation Exploit(MS15-038) An elevation of privilege vulnerability exists when Windows kernel does not properly constrain impersonation levels. The vulnerability occurs because a user can place symlinks for the system drives in the per-login session device map and the kernel will follow them during impersonation. An attacker who successfully exploited this vulnerability may, for example, redirect a call to LoadLibrary, from a system service (when impersonating), to an arbitrary location. CVE-2015-1644 Exploits/Local Windows
Borland AccuRev Reprise License Server edit_lf_process Write Arbitrary Files Exploit The specific flaw exists within the edit_lf_process resource of the AccuRev Reprise License Manager service. The issue lies in the ability to write arbitrary files with controlled data. An attacker could leverage this vulnerability to execute arbitrary code under the context of SYSTEM. NOCVE-9999-74481 Exploits/Remote Windows
SquirrelMail map_yp_alias Command Injection Exploit Update The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.18 and NaSMail before 1.7 allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program. This module works if map:map_yp_alias is set as the imap server address in config.php, which is not the default setting. This update improves os detection and adds runtime cost. CVE-2009-1579 Exploits/Remote Solaris, AIX, Linux
WordPress Landing Pages Plugin Remote Command Execution This update introduces an OS Command Injection Exploit for the "Wordpress Landing Pages" plugin. CVE-2015-5227 Exploits/OS Command Injection/Known Vulnerabilities Linux
Apache ActiveMQ Path Traversal Exploit This update introduces an exploit for Apache ActiveMQ. The vulnerable versions present a path traversal vulnerability in default instalations that allows writing files to arbitrary filesystem locations, with the permissions of the user running the ActiveMQ process. This module leverages the vulnerability to install an agent. This exploit doesn't require authentication. The vulnerability is only present when the application is running in a Windows system. CVE-2015-1830 Exploits/Remote Windows
Linux apport Race Condition Privilege Escalation Exploit Update This module exploits a vulnerability in the Linux apport application. The apport application can be forced to drop privileges to uid 0 and write a corefile anywhere on the system. This can be used to write a corefile with crafted contents in a suitable location to gain root privileges. This updates improves the way some files are cleaned up after a failed exploitation attempt. CVE-2015-1325 Exploits/Local Linux
Microsoft Office Malformed EPS File Vulnerability Exploit Update (MS15-099) Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2013 RT SP1 allows remote attackers to execute arbitrary code via a crafted EPS image, aka "Microsoft Office Malformed EPS File Vulnerability." This version adds support to Office 2010 SP2 and wow64 SO. CVE-2015-2545 Exploits/Client Side Windows
Adobe Acrobat Pro Multiple Vulnerabilities Exploit A specially crafted argument to makeMeasurement will leave objects in an inconsistent state and can produce a Buffer Overflow. This data can later be retrieved via a call to dumpMeasureData. Finally using NSendApprovalToAuthorEnabled method it is possible to bypass the Javascript API restrictions. CVE-2015-4447 Exploits/Client Side Windows
Microsoft Windows Win32k Cursor Object Double Free Vulnerability DoS (MS15-010) Update This module exploits a double free vulnerability in win32k.sys, allowing an unprivileged local user to cause a BSOD. This update improves the post exploitation target information to include the CVE. CVE-2015-0058 Denial of Service/Local Windows