Core Impact Pro Exploits and Security Updates

Core Impact Pro Exploits and Security Updates

When you buy Core Impact Pro, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact Pro. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact Pro keeps you there.

Use the controls below to navigate Core Impact exploits and other modules.

Titlesort descending Description Vulnerabilty Category Platform
Proface GP Pro EX Buffer Overflow Exploit The specific flaw exists within BeginPreRead() processing. When handling malformed 0x7f77 type fields. NOCVE-9999-74950 Exploits/Client Side Windows
ProFTP Welcome Message Buffer Overflow Exploit This exploit takes advantage of a vulnerability that allows attackers to cause ProFTP to execute arbitrary code via a malformed welcome message of the server. CVE-2009-3976 Exploits/Client Side Windows
ProFTPD Controls Buffer Overflow Exploit The internal stack may be overrun using the controls module with a special crafted control sequence. This condition can be exploited by attackers to ultimately execute instructions with the privileges of the ProFTPD process, typically administrator or system. CVE-2006-6563 Exploits/Local Linux
ProFTPD Controls Buffer Overflow Exploit update The internal stack may be overrun using the controls module with a special crafted control sequence. This condition can be exploited by attackers to ultimately execute instructions with the privileges of the ProFTPD process, typically administrator or system. CVE-2006-6563 Exploits/Local Linux
ProFTPD Remote Backdoor Command Execution A backdoor introduced by attackers allows unauthenticated users remote root access to systems which run the maliciously modified version of the ProFTPD daemon. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. NOCVE-9999-46189 Exploits/Remote FreeBSD, Linux
ProFTPD sreplace buffer overflow exploit ProFTPD is prone to an remote buffer-overflow vulnerability. This issue is due to an off-by-one error, allowing attackers to corrupt memory. CVE-2006-5815 Exploits/Remote Linux
ProFTPD Telnet IAC Buffer Overflow Exploit This module exploits a stack overflow vulnerability in proftpd in order to install an agent. The vulnerability is within the function pr_netio_telnet_gets(). The issue is triggered when processing specially crafted Telnet IAC packets delivered to the FTP server. CVE-2010-4221 Exploits/Remote AIX, FreeBSD
Progea Movicon SCADA-HMI TCPUploadServer Remote Exploit This module exploits a remote vulnerability in the TCPUploadServer service included in the Movicon 11 application to install an agent by writing and running an executable file. NOCVE-9999-47538 Exploits/Remote Windows
Promotic SCADA MFC90ENU DLL Hijacking Exploit Promotic SCADA is prone to a vulnerability that may allow execution of mfc71enu if this dll is located in the same folder than .PRA file. NOCVE-9999-50261 Exploits/Client Side Windows
Promotic SCADA SaveCfg ActiveX Buffer Overflow Exploit PROMOTIC SCADA suffers from an ActiveX stack overflow. The exploit is triggered when the SaveCfg() method processes a long string argument resulting in a stack-based buffer overflow. NOCVE-9999-50038 Exploits/Client Side Windows
ProShow Gold PSH Buffer Overflow Exploit The vulnerability is caused due to a boundary error when processing certain overly long entries within slideshow project files (.PSH). CVE-2009-3214 Exploits/Client Side Windows
ProShow Producer kdclib32 DLL Hijacking Exploit ProShow Producer is prone to a vulnerability that may allow the execution of any library file named kdclib32.dll, if this dll is located in the same folder than a .PSH file. NOCVE-9999-46102 Exploits/Client Side Windows
ProSysInfo TFTPDWIN Buffer Overflow Exploit This module exploits a buffer overflow vulnerability during the processing of requested resources to cause a stack-based buffer overflow by requesting a resource with an overly long name. CVE-2006-4948 Exploits/Remote Windows
PSOProxy GET Request Buffer Overflow Exploit The vulnerability is caused due to a boundary error within PSOProxy when processing HTTP GET Request. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted argument passed to the affected command. CVE-2004-0313 Exploits/Remote Windows
Publish-It PUI File Buffer Overflow Exploit Publish-It is prone to a buffer overflow when handling specially crafted PUI files. CVE-2014-0980 Exploits/Client Side Windows
PulseAudio Privilege Escalation Exploit This module exploits a race condition vulnerability in PulseAudio on Linux systems to gain elevated privileges. CVE-2009-1894 Exploits/Local Linux
PureFTPd Bash Variables Injection Exploit (CVE-2014-6271) This update includes a module exploiting a vulnerability found in Bash. When using PureFTPd in conjuntion with the vulnerable Bash version for user authentication, a Core Impact agent is installed. CVE-2014-6271 Exploits/Remote Solaris, Linux
QEMU Floppy Disk Controller fdctrl_handle_drive_specification_command Virtual Machine Escape Exploit (VENOM) The fdctrl_handle_drive_specification_command() function in the code that emulates the Floppy Disk Controller in QEMU does not properly reset the index within a buffer when processing user-controlled data, leading to a heap-based buffer overflow in the QEMU process that runs on the Host system. An attacker running code within a Guest operating system can exploit this vulnerability in order to escape from the QEMU virtual machine and execute arbitrary code on the Host operating system. CVE-2015-3456 Exploits/Local Linux
QEMU Floppy Disk Controller fdctrl_handle_drive_specification_command Virtual Machine Escape Exploit (VENOM) Update The fdctrl_handle_drive_specification_command() function in the code that emulates the Floppy Disk Controller in QEMU does not properly reset the index within a buffer when processing user-controlled data, leading to a heap-based buffer overflow in the QEMU process that runs on the Host system. An attacker running code within a Guest operating system can exploit this vulnerability in order to escape from the QEMU virtual machine and execute arbitrary code on the Host operating system. This update adds support for exploiting 64-bit guest systems. CVE-2015-3456 Exploits/Local Linux
QQPlayer File Processing Buffer Overflow Exploit QQPlayer contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in QQPlayer when handling .ASX files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .ASX file. NOCVE-9999-44532 Exploits/Client Side Windows
Quest InTrust AnnotateX ActiveX Exploit A vulnerability exists in AnnotateX.dll - by invoking the Add() method it is possible to call inside of any memory region of choice as selected by an attacker. NOCVE-9999-51883 Exploits/Client Side Windows
Quick n Easy FTP Server Login DoS This module shuts down the Quick 'n Easy FTP Server because it fails to properly handle user-supplied malformed packets when login. CVE-2009-1602 Exploits/Remote Windows
Quick TFTP Server Pro Mode Remote Buffer Overflow Exploit This module exploits a buffer overflow vulnerability in Quick TFTP Server Pro when processing a very large mode field in a read or write request. CVE-2008-1610 Exploits/Remote Windows
QuickBooks Pro 2010 dbicudtx10 DLL Hijacking Exploit QuickBooks Pro 2010 is prone to a vulnerability that may allow the execution of any library file named dbicudtx10.dll, if this dll is located in the same folder than a .QPG file. NOCVE-9999-46110 Exploits/Client Side Windows
QuickTime JPEG Exploit This module exploits a vulnerability in Apple QuickTime PictureViewer and installs an agent. CVE-2005-2340 Exploits/Client Side Windows
QuickTime JPEG Exploit Update This module exploits a vulnerability in Apple QuickTime PictureViewer and installs an agent. This update adds support for Mac OS X CVE-2005-2340 Exploits/Client Side Windows
QuickTime JPEG Exploit Update 2 This module exploits a vulnerability in Apple QuickTime PictureViewer and installs an agent. This update improve the exploit reliability in Mac OS X. CVE-2005-2340 Exploits/Client Side Windows
QuickTime Player Streaming Debug Error Logging Buffer Overflow Exploit The vulnerability is caused due to a boundary error in QuickTimeStreaming.qtx when constructing a string to write to a debug log file. This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into viewing a specially crafted web page that references a SMIL file containing an overly long URL. CVE-2010-1799 Exploits/Client Side Windows
QuickTime Player Streaming Debug Error Logging Buffer Overflow Exploit Update A stack buffer overflow exists in QuickTime's error logging. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This update embed the .MOV file in Internet Explorer 6 or 7, in other browsers it can be downloaded for use and exploitation in QuickTime. It also add support for Windows Vista. CVE-2010-1799 Exploits/Client Side Windows
QuickTime RTSP Content-Type exploit This module runs a server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting a vulnerability in Apple QuickTime, which allows unauthenticated attackers to execute arbitrary code or cause a denial of service condition. CVE-2007-6166 Exploits/Client Side Windows, Mac OS X