Core Impact Pro Exploits and Security Updates

Core Impact Pro Exploits and Security Updates

When you buy Core Impact Pro, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact Pro. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact Pro keeps you there.

Use the controls below to navigate Core Impact exploits and other modules.

Titlesort descending Description Vulnerabilty Category Platform
QuickTime JPEG Exploit This module exploits a vulnerability in Apple QuickTime PictureViewer and installs an agent. CVE-2005-2340 Exploits/Client Side Windows
QuickTime JPEG Exploit Update This module exploits a vulnerability in Apple QuickTime PictureViewer and installs an agent. This update adds support for Mac OS X CVE-2005-2340 Exploits/Client Side Windows
QuickTime JPEG Exploit Update 2 This module exploits a vulnerability in Apple QuickTime PictureViewer and installs an agent. This update improve the exploit reliability in Mac OS X. CVE-2005-2340 Exploits/Client Side Windows
QuickTime Player Streaming Debug Error Logging Buffer Overflow Exploit The vulnerability is caused due to a boundary error in QuickTimeStreaming.qtx when constructing a string to write to a debug log file. This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into viewing a specially crafted web page that references a SMIL file containing an overly long URL. CVE-2010-1799 Exploits/Client Side Windows
QuickTime Player Streaming Debug Error Logging Buffer Overflow Exploit Update A stack buffer overflow exists in QuickTime's error logging. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This update embed the .MOV file in Internet Explorer 6 or 7, in other browsers it can be downloaded for use and exploitation in QuickTime. It also add support for Windows Vista. CVE-2010-1799 Exploits/Client Side Windows
QuickTime RTSP Content-Type exploit This module runs a server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting a vulnerability in Apple QuickTime, which allows unauthenticated attackers to execute arbitrary code or cause a denial of service condition. CVE-2007-6166 Exploits/Client Side Windows, Mac OS X
QuickTime RTSP Content-Type exploit Mac Intel update This module runs a server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting a vulnerability in Apple QuickTime, which allows unauthenticated attackers to execute arbitrary code or cause a denial of service condition. This update adds Mac Intel support. CVE-2007-6166 Exploits/Client Side Windows, Mac OS X
QuickTime RTSP Content-Type exploit update This module runs a server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting a vulnerability in Apple QuickTime, which allows unauthenticated attackers to execute arbitrary code or cause a denial of service condition. This updates adds Vista as a supported platform for Quicktime 7.3 and also targets Quicktime version 7.2 in both Windows XP and Windows Vista. CVE-2007-6166 Exploits/Client Side Windows, Mac OS X
QuickTime RTSP URL exploit This exploit triggers a stack-based buffer overflow in the QuickTime browser plugin via a specially crafted HTML page. CVE-2007-0015 Exploits/Client Side Windows
QuickView Plus Client vsacs Buffer Overflow Exploit Quick View Plus contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in Quick View Plus when handling .MDB files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .MDB file. This module runs a malicious web server on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to it by opening the crafted MDB file with Quick View Plus. CVE-2013-5791 Exploits/Client Side Windows
Quiksoft EasyMail AddAttachment Method ActiveX Control Buffer Overflow Exploit QuikSoft EasyMail is prone to a buffer overflow. The vulnerability affects the 'AddAttachment()' method of the 'emsmtp.dll'. The issue occurs when the method handles user-input buffer with overly long size. CVE-2009-4663 Exploits/Client Side Windows
RabidHamster R4 Log Entry sprintf Buffer Overflow Exploit A stack overflow found in RabidHamster R4's web server by supplying a malformed HTTP request when generating a log. NOCVE-9999-52541 Exploits/Remote Windows
RadAsm WindowCallProcA Pointer Hijack Exploit The vulnerability is caused due to a boundary error in the processing of .RAP files. This can be exploited to cause a stack-based buffer overflow by tricking a user into decoding a specially crafted .RAP file. CVE-2000-0079 Exploits/Client Side none
RadAsm WindowCallProcA Pointer Hijack Exploit Update The vulnerability is caused due to a boundary error in the processing of .RAP files. This can be exploited to cause a stack-based buffer overflow by tricking a user into decoding a specially crafted .RAP file. This update modifies the current NOCVE for the module and adds support for the new Impact 9 Client Side features. NOCVE-9999-39682 Exploits/Client Side Windows
RainbowPlayer RPL Buffer Overflow Exploit RainbowPlayer is prone to a remote buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. NOCVE-9999-37090 Exploits/Client Side Windows
Real Networks RealPlayer SP RecordClip Exploit This module exploits an arbitrary file download vulnerability in the RecordingManager Control included in RealPlayer SP. CVE-2010-3749 Exploits/Client Side Windows
Real Player MS HelpCenter Command Execution Exploit (MS10-042) This module exploits a vulnerability caused due to an error in the MPC::HTML::UrlUnescapeW() function in helpctr.exe when escaping URLs, add direct exploitation from Real Player to the original Internet Explorer attack vector. CVE-2010-1885 Exploits/Client Side Windows
RealNetworks Arcade Games ActiveX Control Exploit This module runs a web server waiting for vulnerable clients (Internet Explorer with a vulnerable StubbyUtil.InstallerDlg.1 ActiveX Control) to connect to it. When the client connects, it will try to install an agent by sending a specially crafted HTML page which exploits the Real Networks Arcade Game's ActiveX control. ActiveX Control Remote Code Execution Vulnerability. Ref: http://www.exploit-db.com/exploits/17149/ NOCVE-9999-47971 Exploits/Client Side Windows
RealNetworks Helix DNA Server Remote Heap Overflow Exploit This module exploits a remote heap overflow in the Helix DNA Server (rmserver.exe) by sending a specially crafted RTSP packet to the 554/TCP port. CVE-2008-5911 Exploits/Remote Windows
RealNetworks Helix Server AgentX Remote Buffer Overflow Exploit This module exploits a remote stack-based buffer overflow vulnerability in AgentX++, as distributed with Helix Server, by sending multiple blocks of data to the port 705/TCP. CVE-2010-1318 Exploits/Remote Windows
RealNetworks RealPlayer CDDA URI ActiveX Exploit An ActiveX control in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.4, and RealPlayer Enterprise 2.1.2 does not properly initialize an unspecified object component during parsing of a CDDA URI, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer dereference and application crash) via a long URI. CVE-2010-3747 Exploits/Client Side Windows
RealNetworks RealPlayer QCP Parsing Buffer Overflow Exploit The specific flaw exists within qcpfformat.dll, which is responsible for parsing QCP media files. The process creates a static 256 byte allocation on the heap and trusts a user-supplied counter from the file within a memory copy loop. CVE-2011-2950 Exploits/Client Side Windows
RealNetworks RealPlayer QCP Parsing Buffer Overflow Exploit Update The specific flaw exists within qcpfformat.dll, which is responsible for parsing QCP media files. The process creates a static 256 byte allocation on the heap and trusts a user-supplied counter from the file within a memory copy loop. This version adds support for Internet Explorer 8 with java enabled. CVE-2011-2950 Exploits/Client Side Windows
RealPlayer ActiveX Buffer Overflow Exploit This module exploits a vulnerability caused due to a boundary error in the ierpplug.dll of the Real Player application. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. CVE-2007-5601 Exploits/Client Side Windows
RealPlayer ActiveX Buffer Overflow Exploit Update This module exploits a vulnerability caused due to a boundary error in the ierpplug.dll of the Real Player application. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. CVE-2007-5601 Exploits/Client Side Windows
RealPlayer Cook Codec Channel Parsing Code Execution Exploit A code execution vulnerability exists in the way that RealPlayer parses files encoded with Cook codec. CVE-2011-4257 Exploits/Client Side Windows
RealPlayer RealMedia File Buffer Overflow Exploit RealPlayer is prone to a stack based buffer overflow when opening specially crafted Real Media files. CVE-2012-5691 Exploits/Client Side Windows
RealPlayer rmoc3260.dll ActiveX Buffer Overflow Exploit This module exploits a heap-based buffer overflow in the rmoc3260.dll ActiveX Control included in Real Player 11. CVE-2008-1309 Exploits/Client Side Windows
RealPlayer SMIL wallclock Buffer Overflow Exploit This module exploits a vulnerability caused due to a boundary error in the wallclock functionality in SmilTimeValue::parseWallClockValue() when handling time formats. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. CVE-2007-3410 Exploits/Client Side Windows
RealPlayer TRACKID tag handling RMP Buffer Overflow Exploit Real Media Player are vulnerable to a heap buffer overflow when provided with a specially crafted .rmp file with malformed TRACKID tags. CVE-2013-6877 Exploits/Client Side Windows