Core Impact Threat Intelligence Exploits, Security and Penetration Testing Updates

Core Impact Threat Intelligence Exploits, Security and Penetration Testing Updates

When you buy Core Impact, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Use the controls below to navigate Core Impact exploits and other modules.

Title Description Vulnerabilty Category Platform
Microsoft Windows SRV.SYS Server Driver DoS (MS06-035) A boundary error in the Server service (SRV.SYS) when handling first-class Mailslot messages can be exploited to corrupt memory by sending a specially crafted packet to the service. CVE-2006-1314 Denial of Service/Remote Windows
CA Antivirus CAB Header Parsing Buffer Overflow Exploit This module exploits a stack based buffer overflow vulnerability in CA Antivirus when handling a specially crafted CAB file. CVE-2007-2864 Exploits/Client Side Windows
Drupal Forum Cross Site Scripting Exploit A Cross-Site Scripting (XSS) vulnerability in the Forum module in Drupal 6.x (proir to version 6.13) allows remote attackers to inject arbitrary web scripts or HTML by requesting a specially crafted tid. The vulnerability is present only if the Forum module is activated, this is not the default configuration but the module is shipped by default with Drupal. CVE-2009-2373 Exploits/Cross Site Scripting (XSS)/Known Vulnerabilities none
JOnAS Remote Command Injection Exploit This module exploits a XSS vulnerability in JOnAS which allows IMPACT Pro to perform remote command injection impersonating an administrator and uploading a plugin to the JOnAS server. This module runs a web server waiting for a JOnAS administrator to connect to it. When the client connects, it will retrieve their JOnAS cookie and try to install an agent on the JOnAS server by installing a custom plugin in JOnAS. NOCVE-9999-36877 Exploits/Client Side Windows, Mac OS X, Linux
Winamp gen_ff DLL Buffer Overflow Exploit Update Winamp is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. This update enhances support for the Impact 9. CVE-2009-1831 Exploits/Client Side Windows
Jetty Directory Listing Cross Site Scripting Exploit A Cross-Site scripting vulnerability has been reported in Jetty. This vulnerability can be induced whenever Jetty displays a web directory listing. Client-side script code can be included in the HTTP response by appending it next to directory listing's path, preceded by a ';' character. CVE-2009-1524 Exploits/Cross Site Scripting (XSS)/Known Vulnerabilities none
Phpmyadmin Server_databases Remote Code Execution Exploit Update This updates provides more readable log messages when specific errors occur and improves the reliability of the exploit. CVE-2008-4096 Exploits/Remote Linux
Winamp Computer Name Handling Buffer Overflow Exploit Update This module exploits a vulnerability in Winamp 5.12. This Update adds support for Impact v9 and Windows XP SP3. CVE-2006-0476 Exploits/Client Side Windows
Microsoft Windows MSMQ Null Pointer DoS (MS09-040) This module exploits a vulnerability in Microsoft Message Queue Service driver (MQAC.SYS). The IOCTL handler in the MQAC.SYS device driver allows local users to overwrite memory via malformed Interrupt Request Packet (Irp) parameters. CVE-2009-1922 Denial of Service/Local Windows
Microsoft Word Malformed Object Pointer Exploit (MS06-027) Microsoft Word is prone to a remote code-execution vulnerability. The issue arises because Word fails to properly handle malformed object pointers. CVE-2006-2492 Exploits/Client Side Windows
Apple Mac OS X HFS Plus Local Privilege Escalation Exploit XNU 1228.9.59 and earlier on Apple Mac OS X 10.5.6 and earlier does not properly restrict interaction between user space and the HFS IOCTL handler. This allows local users to overwrite kernel memory and gain privileges by attaching an HFS+ disk image and performing certain steps involving HFS_GET_BOOT_INFO fcntl calls. CVE-2009-1235 Exploits/Local Mac OS X
ProFTP Welcome Message Buffer Overflow Exploit This exploit takes advantage of a vulnerability that allows attackers to cause ProFTP to execute arbitrary code via a malformed welcome message of the server. CVE-2009-3976 Exploits/Client Side Windows
Adobe Flash Player SWF Buffer Overflow Exploit Update 2 This module exploits a vulnerability in Adobe Flash Player triggered when processing a specially crafted SWF file. This update resolves an issue with how the exploit uses client side cookies. CVE-2007-0071 Exploits/Client Side Windows
VirtualMin Dom Parameter Cross Site Scripting Exploit Input passed to the "dom" parameter in left.cgi and via the URL to virtual-server/link.cgi is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. NOCVE-9999-39439 Exploits/Cross Site Scripting (XSS)/Known Vulnerabilities none
IIS FTP NLST Buffer Overflow Exploit This module exploits a buffer overflow in the FTP server in Microsoft Internet Information Server (IIS) via a crafted NLST command that uses wildcards. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2009-3023 Exploits/Remote Windows
Microsoft Windows SMB 2.0 Negociate Protocol Request Remote BSOD DoS This module exploits a remote denial of service condition by sending a specially crafted SMB 2.0 packet to the target machine. Windows Vista and 7 are affected by this problem. This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. NOCVE-9999-40005 Denial of Service/Remote Windows
TinyWebGallery Remote Code Execution Exploit This module exploits a TinyWebGallery local file-include vulnerability because TinyWebGallery fails to properly sanitize user-supplied input. The module takes advantage of the logging capabilities of the attacked software to remotely execute arbitrary code. CVE-2009-1911 Exploits/Remote Code Execution Windows, Solaris, AIX, Linux
Oracle Web Logic IIS JSESSIONID Buffer Overflow Exploit This module exploits a vulnerability in Oracle WebLogic IIS Connector when sending a specially crafted POST message with a specially JSESSIONID cookie. CVE-2008-5457 Exploits/Remote Windows
IIS FTP LIST Stack Exhaustion DoS This exploit forces the IIS process inetinfo.exe to throw an unhandled exception. IIS' behavior depends on the operating system version, its configuration and the system-wide debugger specified in the registry. By default under Windows 2000 Advanced Server 2000 the server will automatically restart. Under Windows 2000 Professional a message box will pop up in the console and the server will not be restarted until a user presses [OK]. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2009-2521 Denial of Service/Remote Windows
Microsoft Windows Telnet Credential Reflection (MS09-042) This module exploits a vulnerability on telnet.exe using SMB relay attack. Warning: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2009-1930 Exploits/Tools Windows
Microsoft MDAC RDS.Dataspace ActiveX Control Exploit The RDS.Dataspace ActiveX control includes a method that can create an instance of an ActiveX control that exists on the system. The ActiveX objects created in this manner will bypass the ActiveX security model. In particular, the "safe for scripting" and killbit options are ignored. Note that in default configurations of Internet Explorer, the RDS.Dataspace ActiveX control cannot be loaded in the Internet Zone. CVE-2006-0003 Exploits/Client Side Windows
DXStudio Firefox Plugin Remote Command Execution Exploit This module exploits a remote command execution vulnerability in DX Studio Player plugin for Firefox via an specially crafted .dxstudio file. CVE-2009-2011 Exploits/Client Side Windows
Remote Exploits Invalid Characters Update This update corrects a typo defining invalid characters for the egg in some remote exploits, and improves the reliability of Now SMS MMS Gateway Web Authorization Buffer Overflow Exploit on Windows 2000 targets. CVE-2007-4440 Exploits/Remote Windows
Exploit Modules Update for RPT This update applies missing attributes to a small number of exploits to ensure they are correctly selected by the Rapid Penetration Test Wizards. CVE-2008-1914 Exploits/Remote Windows, Linux
Joomla 1.5.12 Remote Code Execution Exploit A vulnerability exists in the TinyMCE editor, included in the tiny browser plugin, which allows uploading files without authentication. This can be exploited to upload files with multiple extensions and execute arbitrary PHP code. NOCVE-9999-39524 Exploits/Remote Solaris, Linux, Windows
Wordpress Password Reset Exploit A weakness has been reported in WordPress which can be exploited to bypass certain security restrictions. The weakness is due to a bug within the password reset functionality when verifying the secret key. This can be exploited to reset the password of the first user without a key in the database (usually administrator) without providing the correct secret key. NOCVE-9999-39525 Exploits/Authentication Weakness none
RadAsm WindowCallProcA Pointer Hijack Exploit Update The vulnerability is caused due to a boundary error in the processing of .RAP files. This can be exploited to cause a stack-based buffer overflow by tricking a user into decoding a specially crafted .RAP file. This update modifies the current NOCVE for the module and adds support for the new Impact 9 Client Side features. NOCVE-9999-39682 Exploits/Client Side Windows
Symantec Intel Alert Originator Service Buffer Overflow Exploit This module exploits a buffer overflow vulnerability in the Intel Alert Originator service by sending a specially crafted packet to the 38292/TCP port. CVE-2009-1430 Exploits/Remote Windows
Awingsoft Awakening Remote Command Execution Exploit Awingsoft Awakening (aka Winds3D) Viewer, which runs as a plugin within most popular web browsers, is vulnerable to a remotely exploitable arbitrary command execution vulnerability which can be triggered by making the user visit a malicious link/website. CVE-2009-2386 Exploits/Client Side Windows
PeaZIP Archived File Name Handling Command Injection Exploit PeaZIP allows user-assisted remote attackers to execute arbitrary commands via a compressed archive with a .TXT file whose name contains | (pipe) characters and a command. CVE-2009-2261 Exploits/Client Side Windows