Core Impact Security and Penetration Testing Updates

Core Impact Threat Intelligence Exploits, Security and Penetration Testing Updates

When you buy Core Impact, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Use the controls below to navigate Core Impact exploits and other modules.

Titlesort ascending Description Vulnerabilty Category Platform
ElbyCDIO IO Driver Privilege Escalation Exploit This module exploits a vulnerability in ElbyCDIO.SYS driver when handling a specially crafted IOCTL request. The vulnerability allows local users to overwrite memory and execute arbitrary code via malformed Interrupt Request Packet (Irp) parameters. CVE-2009-0824 Exploits/Local Windows
Elastix PBX Remote PHP Injection Exploit This module exploits a remote PHP code injection vulnerability in Elastix PBX by uploading a renamed PHP file and leveraging a local file inclusion vulnerability to execute the PHP file. It also exploits a bad configuration in the /etc/sudoers file to elevate privileges from 'asterisk' user to 'root'. NOCVE-9999-56369 Exploits/Remote Linux
ElasticSearch Search Groovy Sandbox Bypass Remote Execution Exploit A vulnerability in ElasticSearch versions 1.4.0 to 1.4.2 allows execution of unsandboxed Groovy code. This module installs an OS agent in vulnerable targets. CVE-2015-1427 Exploits/Remote Windows, Linux
EFS Chat Server POST Buffer Overflow Exploit Username parameter in Registeration page 'register.ghp' is prone to a stack-based buffer-overflow vulnerability. Application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. NOCVE-9999-92479 Exploits/Remote Windows
EffectMatrix Magic Morph File Handling Buffer Overflow Exploit Stack-based buffer overflow in EffectMatrix (E.M.) Magic Morph 1.95b allows remote attackers to execute arbitrary code via a long string in a .MOR file. CVE-2009-3338 Exploits/Client Side Windows
Effective File Search ztvunrar36 DLL Hijacking Exploit Effective File Search is prone to a vulnerability that may allow the execution of any library file named ztvunrar36.dll, if this dll is located in the same folder than a .EFS file. NOCVE-9999-49253 Exploits/Client Side Windows
eEye Retina WiFi Scanner RWS Buffer Overflow Exploit eEye Retina WiFi Scanner is prone to a buffer-overflow vulnerability when handling .RWS files having an overly long string. CVE-2009-3859 Exploits/Client Side Windows
Edraw Office Viewer Component Buffer Overflow Exploit This module exploits a vulnerability in the officeviewer.ocx control included in the Edraw Office Viewer Component ActiveX application. The exploit is triggered when the HttpPost() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. NOCVE-9999-47275 Exploits/Client Side Windows
eDisplay Personal FTP Server RMD Command Buffer Overflow Exploit eDisplay Personal FTP server is an FTP server for Microsoft Windows. The server is exposed to multiple remote buffer overflow issues because it fails to perform adequate boundary checks on user-supplied data, for example, sending an RMD crafted command NOCVE-9999-42732 Exploits/Remote Windows
Eaton ELCSoft EPC File Buffer Overflow Exploit The specific flaw exists within processing of EPC files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. NOCVE-9999-94184 Exploits/Client Side Windows
Eaton ELCSoft ELCSimulator Buffer Overflow Exploit The specific flaw exists within the processing of network TCP requests by ELCSimulator.exe. A crafted request will cause a stack buffer overflow. CVE-2016-4512 Exploits/Remote Windows
EasyHDR FITS Buffer Overflow Exploit A stack-based buffer overflow in easyHDR PRO allows an attacker to execute arbitrary code via an invalid Flexible Image Transport System (FITS) file. CVE-2009-0254 Exploits/Client Side Windows
Easy RM to MP3 Converter Buffer Overflow Exploit Easy RM to MP3 Converter is vulnerable to a stack-based buffer overflow, caused by improper bounds checking when parsing specially crafted .pls files. CVE-2009-1330 Exploits/Client Side Windows
Easy FTP Server Multiple Remote Buffer Overflow An internal memory buffer of Easy FTP Server may be overrun while handling long "APPE" command. This condition may be exploited by attackers to ultimately execute instructions with the privileges of the ftpbasicsvr.exe process. NOCVE-9999-42134 Exploits/Remote Windows
Easy File Sharing Web Server UserID Cookie Handling Buffer Overflow Exploit By setting UserID in the cookie to a long string, we can overwrite EDX which allows us to control execution flow when the following instruction is executed. CVE-2014-3791 Exploits/Remote Windows
Easy File Sharing Web Server GET Request Exploit Easy File Sharing is prone to a buffer-overflow when handling a specially crafted GET request. NOCVE-9999-74961 Exploits/Remote Windows
Easy File Sharing FTP Server PASS Buffer Overflow Exploit The vulnerability is caused due to a boundary error with the handling of passwords. This can be exploited to cause a stack-based buffer overflow via an overly long, specially-crafted passwords passed to the affected server. CVE-2006-3952 Exploits/Remote Windows
Easy File Management Web Server UserID Cookie Handling Buffer Overflow Exploit The vulnerability is caused due to a boundary error when parsing the "UserID" value in the session cookie, which can be exploited to cause a stack-based buffer overflow. NOCVE-9999-65448 Exploits/Remote Windows
Easy Chat Server Authentication Request Buffer Overflow Exploit A remote user of vulnerable installations of Easy Chat Server can send a specially crafted password parameter to chat.ghp to trigger a buffer overflow and execute arbitrary code on the target system. NOCVE-9999-36981 Exploits/Remote Windows
e107 Install Script Command Injection Exploit Update This update appends support for solaris and Mac OS X. CVE-2011-1513 Exploits/Remote Windows, Solaris, Linux, Mac OS X
e107 Install Script Command Injection Exploit e107 CMS is vulnerable to a command injection in its installation script due to a lack of sanitization on the MySQL server parameter. CVE-2011-1513 Exploits/Remote Windows, Solaris, Linux, Mac OS X
DXStudio Firefox Plugin Remote Command Execution Exploit This module exploits a remote command execution vulnerability in DX Studio Player plugin for Firefox via an specially crafted .dxstudio file. CVE-2009-2011 Exploits/Client Side Windows
DVD X Player Professional PLF File Buffer Overflow Exploit The vulnerability is caused due to a boundary error in DVD X Player Professional when handling .PLF files. This can be exploited to cause a stack-based buffer overflow via a specially crafted file of said extension. NOCVE-9999-49219 Exploits/Client Side Windows
Dup Scout Enterprise Username Buffer Overflow Exploit Dup Scout is prone to a buffer overflow when handling an overly long username. NOCVE-9999-98891 Exploits/Remote Windows
Dup Scout Enterprise Login Buffer Overflow Exploit This module exploits a stack-based buffer overflow vulnerability in the web interface of Dup Scout Enterprise caused by improper bounds checking on the login process sent to the built-in web server. NOCVE-9999-84008 Exploits/Remote Windows
Drupal RESTWS Module PHP Remote Command Injection Exploit RESTWS alters the default page callbacks for entities to provide additional functionality. A vulnerability in this approach allows an unauthenticated attacker to send specially crafted requests resulting in arbitrary PHP execution. NOCVE-9999-75002 Exploits/OS Command Injection/Known Vulnerabilities Linux
Drupal Forum Cross Site Scripting Exploit A Cross-Site Scripting (XSS) vulnerability in the Forum module in Drupal 6.x (proir to version 6.13) allows remote attackers to inject arbitrary web scripts or HTML by requesting a specially crafted tid. The vulnerability is present only if the Forum module is activated, this is not the default configuration but the module is shipped by default with Drupal. CVE-2009-2373 Exploits/Cross Site Scripting (XSS)/Known Vulnerabilities none
Drupal core SQL injection Exploit Update This update is to add the exploit in order to attack Drupal core CMS 7.x versions prior to 7.32 using default configuration (CVE-2014-3704). CVE-2014-3704 Exploits/OS Command Injection/Known Vulnerabilities Windows, Linux
Drupal BlogAPI Remote Execution Exploit Update 4 The BlogAPI module does not validate the extension of files that it is used to upload, enabling users with the "administer content with blog api" permission to upload harmful files. This module uploads an IMPACT agent, creates a php file to execute the agent and then makes a request to the file. The result is an IMPACT agent running on the webserver. This update adds support for the AIX platform. CVE-2008-4792 Exploits/Remote Solaris, Linux, AIX
Drupal BlogAPI Remote Execution Exploit Update 3 The BlogAPI module does not validate the extension of files that it is used to upload, enabling users with the "administer content with blog api" permission to upload harmful files. This module uploads an IMPACT agent, creates a php file to execute the agent and then makes a request to the file. The result is an IMPACT agent running on the webserver. This update adds support for Solaris platforms. CVE-2008-4792 Exploits/Remote Solaris, Linux, AIX