Core Impact Threat Intelligence Exploits, Security and Penetration Testing Updates
When you buy Core Impact, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.
Use the controls below to navigate Core Impact exploits and other modules.
Title![]() |
Description | Vulnerabilty | Category | Platform |
---|---|---|---|---|
Oracle Business Process Management Cross Site Scripting Exploit | A cross site scripting vulnerability in the context parameter in webconsole/faces/jsf/tips.jsp. | CVE-2010-2370 | Exploits/Cross Site Scripting (XSS)/Known Vulnerabilities | none |
Oracle Document Capture BlackIceDevMode ActiveX Buffer Overflow Exploit | The Import Server component of Oracle WebCenter Capture is affected by a buffer overflow vulnerability. This could allow command execution when a user loads a web page which calls the SetAnnotationFont method of the BlackIceDevMode.ocx ActiveX control with a overly long string argument. | CVE-2013-1516 | Exploits/Client Side | Windows |
Oracle Forms and Reports Remote Code Execution Exploit | This vulnerabilities allows remote attackers writing to the host filesystem on vulnerable installations of software utilizing Oracle Forms and Reporting. | CVE-2012-3152 | Exploits/Remote | Windows |
Oracle GlassFish Server Administration Console Authentication Bypass Remote Code Execution Exploit | The Administration Console of Oracle GlassFish Server is prone to an authentication bypass vulnerability, which can be achieved by performing HTTP TRACE requests. A remote unauthenticated attacker can exploit this in order to execute arbitrary code on the vulnerable server. | CVE-2011-1511 | Exploits/Remote Code Execution | Solaris, Windows, Linux, Mac OS X |
Oracle GlassFish Server Administration Console Authentication Bypass Remote Code Execution Exploit Update | The Administration Console of Oracle GlassFish Server is prone to an authentication bypass vulnerability, which can be achieved by performing HTTP TRACE requests. A remote unauthenticated attacker can exploit this in order to execute arbitrary code on the vulnerable server. This update adds support for Solaris platforms. | CVE-2011-1511 | Exploits/Remote Code Execution | Solaris, Windows, Linux, Mac OS X |
Oracle Java 7U11 JMX Remote Code Execution Exploit | The default Java security properties configuration does not restrict access to certain objects in the com.sun.jmx.mbeanserver packages. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user. | CVE-2013-0431 | Exploits/Client Side | Windows, Mac OS X, Linux |
Oracle Java Applet2ClassLoader Remote Code Execution Exploit | The sun.plugin2.applet.Applet2ClassLoader class of Oracle Java does not properly validate if the URL of a Java class file matches the "codebase" parameter while loading applets. This vulnerability allows an applet to execute arbitrary code outside the sandbox without restrictions, which can be exploited to install an agent on the target machine. | CVE-2010-4452 | Exploits/Client Side | Windows |
Oracle Java AtomicReferenceArray Type Confusion Exploit | Unsafe type handling performed by the AtomicReferenceArray class of the Oracle Java Runtime Environment can be abused to cause a type confusion error. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user. | CVE-2012-0507 | Exploits/Client Side | Windows, Linux, Mac OS X |
Oracle Java AtomicReferenceArray Type Confusion Exploit Update | Unsafe type handling performed by the AtomicReferenceArray class of the Oracle Java Runtime Environment can be abused to cause a type confusion error. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user. | CVE-2012-0507 | Exploits/Client Side | Windows, Linux, Mac OS X |
Oracle Java Beans Statement Remote Code Execution Exploit | An AccessControlContext attribute in the java.beans.Statement class of Oracle Java can be overwritten by unprivileged applets by using specially crafted Java Beans Expressions and Statements, even when the AccessControlContext attribute is declared as final. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. | CVE-2012-4681 | Exploits/Client Side | Windows, Linux, Mac OS X |
Oracle Java Beans Statement Remote Code Execution Exploit Update | An AccessControlContext attribute in the java.beans.Statement class of Oracle Java can be overwritten by unprivileged applets by using specially crafted Java Beans Expressions and Statements, even when the AccessControlContext attribute is declared as final. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. | CVE-2012-4681 | Exploits/Client Side | Windows, Linux, Mac OS X |
Oracle Java ByteComponentRaster Memory Corruption Exploit | The ByteComponentRaster.verify() method in Oracle Java versions prior to 7u25 holds a memory corruption vulnerability that allows the bypassing of "dataOffsets[]" boundary checks. This module exploits such vulnerability allowing for remote code execution. | CVE-2013-2473 | Exploits/Client Side | Windows, Linux |
Oracle Java BytePackedRaster Exploit | This module exploits a vulnerability in Oracle Java. The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This vulnerability allows for remote code execution. | CVE-2013-2463 | Exploits/Client Side | Windows, Linux |
Oracle Java CMM cmmColorConvert Memory Corruption Exploit | The color management(CMM) funcionality in Oracle Java is prune to a memory corruption vulnerability which allows to run Java code outside the sandbox. | CVE-2013-1493 | Exploits/Client Side | Windows |
Oracle Java docBase Parameter Buffer Overflow Exploit | The Java plugin for Internet Explorer is affected by a stack-based buffer overflow when processing the docBase parameter of a Java applet. This can be exploited to execute arbitrary code with the privileges of the current user by enticing the victim to visit a malicious web page. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. | CVE-2010-3552 | Exploits/Client Side | Windows |
Oracle Java docBase Parameter Buffer Overflow Exploit Update | The Java plugin for Internet Explorer (jp2iexp.dll) is affected by a stack-based buffer overflow when processing the docBase parameter of a Java applet. This can be exploited to execute arbitrary code with the privileges of the current user by enticing the victim to visit a malicious web page. This update adds DEP bypassing capability to the exploit, and adds support for Windows 7, Windows Server 2008, and Internet Explorer 8. | CVE-2010-3552 | Exploits/Client Side | Windows |
Oracle Java Driver Manager Remote Code Execution Exploit | This module exploits a vulnerability in Oracle Java taking advantages of the java.sql.DriverManager class. The specific flaw exists within the usage of java.sql.DriverManager. The issue lies in an implicit call to toString() that is made within a doPrivileged block. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user. This vulnerability was one of the 2013's Pwn2Own challenges. | CVE-2013-1488 | Exploits/Client Side | Windows, Linux, Mac OS X |
Oracle Java Dynamic Binding Remote Code Execution Exploit | An error in the way that Java implements dynamic binding can be abused to overwrite public final fields. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. | CVE-2013-2423 | Exploits/Client Side | Windows, Linux, Mac OS X |
Oracle Java Dynamic Binding Remote Code Execution Exploit Update | An error in the way that Java implements dynamic binding can be abused to overwrite public final fields. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user. This update adds the CVE number to the exploit. | CVE-2013-2423 | Exploits/Client Side | Windows, Linux, Mac OS X |
Oracle Java Field Access Bytecode Verifier Cache Remote Code Execution Exploit | An error in the way the bytecode verifier of Java validates field access instructions when preparing to JIT-compile a method can be abused to cause a type confusion vulnerability. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user. | CVE-2012-1723 | Exploits/Client Side | Windows, Linux |
Oracle Java Font Handling Remote Code Execution Exploit | A specific flaw exists within the handling of CFF-based OpenType fonts. The issue lies in two operators that allow for reading and writing elements beyond the allocated buffers. An attacker can leverage this vulnerability to execute code under the context of the current process. | CVE-2013-1491 | Exploits/Client Side | Windows |
Oracle Java IntegerInterleavedRaster Signed Integer Overflow Exploit | This module exploits a vulnerability in Oracle Java. The vulnerability is an invalid array indexing that exists within the native IntegerInterleavedRaster.verify() function inside jre/bin/awt.dll | CVE-2013-2471 | Exploits/Client Side | Windows, Linux |
Oracle Java JAX-WS Remote Code Execution Exploit | The default Java security properties configuration did not restrict access to certain com.sun.org.glassfish packages. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this moduleis not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. | CVE-2012-5076 | Exploits/Client Side | Windows, Linux |
Oracle Java JMX Remote Code Execution Exploit | The default Java security properties configuration does not restrict access to certain objects in the com.sun.jmx.mbeanserver packages. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user. This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. | CVE-2013-0422 | Exploits/Client Side | Windows, Linux |
Oracle Java JMX Remote Code Execution Exploit Update | The default Java security properties configuration does not restrict access to certain objects in the com.sun.jmx.mbeanserver packages. This flaw allows an unprivileged Java applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user. This update adds support for Mac OS X 10.7.4 (i386). | CVE-2013-0422 | Exploits/Client Side | Windows, Linux, Mac OS X |
Oracle Java OutOfMemoryError Binary Planting Exploit | This module exploits a binary planting vulnerability in Oracle Java JRE. The vulnerability is caused due to the application loading an executable file in an insecure manner when an out of memory condition occurs. This can be exploited to execute arbitrary programs by tricking a user into e.g. opening a HTML file, which loads an applet located on a remote WebDAV or SMB share. | NOCVE-9999-49284 | Exploits/Client Side | Windows |
Oracle Java ProviderSkeleton Remote Code Execution Exploit | This module exploits a vulnerability in Oracle Java. Abusing the insecure invoke() method of the ProviderSkeleton class that allows to call arbitrary static methods with user supplied arguments it is possible to execute arbitrary code. | CVE-2013-2460 | Exploits/Client Side | Windows, Linux |
Oracle Java Rhino Script Engine Remote Code Execution Exploit | The Rhino Script Engine of Oracle Java fails to properly check for permissions on JavaScript error objects. This flaw allows an unprivileged applet to escape the sandbox and execute arbitrary code on the target machine with the privileges of the current user. | CVE-2011-3544 | Exploits/Client Side | Windows, Linux |
Oracle Java ShortComponentRaster Exploit | The ShortComponentRaster.verify() method in Oracle Java versions prior to 7u25 holds a memory corruption vulnerability that allows the bypassing of "dataOffsets[]" boundary checks. This module exploits such vulnerability allowing for remote code execution. | CVE-2013-2472 | Exploits/Client Side | Windows, Linux |
Oracle Java Soundbank Resource Name Buffer Overflow Exploit | This module exploits a stack-based buffer overflow vulnerability in Oracle Java SE when jsound.dll parses a specially crafted Soundbank file. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. | CVE-2010-0839 | Exploits/Client Side | Windows |