Core Impact Pro Exploits and Security Updates

Core Impact Pro Exploits and Security Updates

When you buy Core Impact Pro, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact Pro. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact Pro keeps you there.

Use the controls below to navigate Core Impact exploits and other modules.

Titlesort ascending Description Vulnerabilty Category Platform
Cool PDF Reader Buffer Overflow Exploit Cool PDF Reader is prone to a buffer-overflow when handling pdf documents with a specially crafted stream. CVE-2012-4914 Exploits/Client Side Windows
Control Microsystems ClearSCADA Remote DoS Update This module exploits a vulnerability in the ClearSCADA Server service by sending a malformed packet to the 5481/TCP port to crash the application. This Update increases the MAX TRIES default value because it has not been reliable. CVE-2011-3143 Denial of Service/Remote Windows
Control Microsystems ClearSCADA Remote DoS This module exploits a vulnerability in the ClearSCADA Server service by sending a malformed packet to the 5481/TCP port to crash the application. NOCVE-9999-47161 Denial of Service/Remote Windows
Conficker Detector Exploit Update This module connects to a remote target via any exposed DCE RPC endpoints and fingerprints them to determine if the machine appears to be compromised by the Conficker worm. This update adds RPT capabilities. NOCVE-9999-37300 Exploits/Remote Windows
Computer Associates eTrust Secure Content Manager DoS The eCS component (ECSQdmn.exe) in CA ETrust Secure Content Manager 8.0 and CA Gateway Security 8.1 allows remote attackers to cause a denial of service (crash) via a crafted request to port 1882, involving an incorrect integer calculation and a heap-based buffer overflow. CVE-2011-0758 Denial of Service/Remote Windows
CoDeSys SCADA Webserver Buffer Overflow Exploit webserver.exe is a component in 3S CoDeSys for handling the HTTP connections on port 8080. The process is affected by a buffer overflow that copies the input URI in a limited buffer allowing code execution. NOCVE-9999-50546 Exploits/Remote Windows
Client Side Exploits Save Attach Update This module improves several features for client side exploits. CVE-2007-2193 Exploits/Client Side Windows, Mac OS X, Linux
Citrix Provisioning Services streamprocess Remote Buffer Overflow Exploit Update This module exploits a remote buffer overflow in the streamprocess.exe service included in the Citrix Provisioning Services application by sending a malformed packet to the 6905/UDP port. This update fixes an issue in the agent connector. NOCVE-9999-46895 Exploits/Remote Windows
Citrix Provisioning Services streamprocess Remote Buffer Overflow Exploit This module exploits a remote buffer overflow in the streamprocess.exe service included in the Citrix Provisioning Services application by sending a malformed packet to the 6905/UDP port. NOCVE-9999-46895 Exploits/Remote Windows
Citrix Provisioning Services Streamprocess Opcodes Buffer Overflow Exploit Update This module exploits a remote buffer overflow in the streamprocess.exe service included in the Citrix Provisioning Services application by sending a malformed packet to the 6905/UDP port. This module adds support for Windows 2003. NOCVE-9999-50874 Exploits/Remote Windows
Citrix Provisioning Services Streamprocess Opcodes Buffer Overflow Exploit This module exploits a remote buffer overflow in the streamprocess.exe service included in the Citrix Provisioning Services application by sending a malformed packet to the 6905/UDP port. NOCVE-9999-50874 Exploits/Remote Windows
Citrix Provisioning Services Streamprocess Opcode 0x40020000 Buffer Overflow Exploit This module exploits a remote buffer overflow in the streamprocess.exe service included in the Citrix Provisioning Services application by sending a malformed packet to the 6905/UDP port. NOCVE-9999-50874 Exploits/Remote Windows
Citrix NetScaler SOAP Handler Remote Code Execution Exploit Update This module exploits a vulnerability in Citrix NetScaler server. Citrix NetScaler is prone to a memory-corruption vulnerability when handling certain SOAP requests. This update improves exploit reliability. NOCVE-9999-69407 Exploits/Remote FreeBSD
Citrix NetScaler SOAP Handler Remote Code Execution Exploit This module exploits a vulnerability in Citrix NetScaler server. Citrix NetScaler is prone to a memory-corruption vulnerability when handling certain SOAP requests. NOCVE-9999-69407 Exploits/Remote FreeBSD
Citrix Gateway ActiveX Nsepa Buffer Overflow Exploit This module exploits a buffer overflow vulnerability in the NSEPA.NsepaCtrl.1 ActiveX control in Nsepa.ocx in Citrix Access Gateway Enterprise Edition. When the control processes a crafted HTTP header data, a stack based buffer overflow occurs allowing execution of arbitrary code. CVE-2011-2882 Exploits/Client Side Windows
Citrix EdgeSight Remote DoS Citrix EdgeSight is prone to a Denial of Service within the LauncherService.exe component which listens by default on TCP port 18747. When handling a request the process trusts a user supplied field in the packet specifying the length of data to follow, the process then copies the user supplied data, without validation, into a fixed-length buffer on the heap. NOCVE-9999-48569 Denial of Service/Remote Windows
CitectSCADA Buffer Overflow Exploit Remote exploitation of a buffer overflow vulnerability in CitectSCADA allows for the remote execution of arbitrary code by attackers. CVE-2008-2639 Exploits/Remote Windows
Cisco WebEx Player WRF Stack Overflow Exploit Cisco WebEx Player is prone to a stack-based buffer overflow when handling specially crafted .WRF files. This module exploits that vulnerability in order to deploy an agent. CVE-2010-3269 Exploits/Client Side Windows
Cisco Secure Desktop CSDWebInstaller ActiveX Exploit This module exploits a vulnerability in CSDWebInstaller.ocx included on Cisco Secure Desktop. The vulnerability is triggered when the ActiveX control verifies the signing authority names in the certificate chain but fails to properly verify the digital signature of an executable file that is downloaded and then executed. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. CVE-2011-0926 Exploits/Client Side Windows
Cisco Secure ACS UCP CSuserCGI.exe Remote Buffer Overflow Exploit The vulnerability is caused due to a boundary error within Cisco Secure ACS UCP when processing users info with CSuserCGI.exe vulnerable module. CVE-2008-0532 Exploits/Remote Windows
Cisco Prime Infrastructure Java Object Deserialization Remote Code Execution Exploit Cisco Prime Infrastructure 1.2.0 through 2.2(2) and Cisco Evolved Programmable Network Manager (EPNM) 1.2 allow remote attackers to execute arbitrary code via crafted deserialized data in an HTTP POST request, aka Bug ID CSCuw03192. CVE-2016-1291 Exploits/Remote Linux
Cisco Packet Tracer wintab32 DLL Hijacking Exploit Cisco Packet Tracer is prone to a vulnerability that may allow execution of wintab32.dll if this dll is located in the same folder than .PKT file. CVE-2010-3135 Exploits/Client Side Windows
Cisco NX-OS CDP Remote Exploit A vulnerability has been reported as Cisco Bug ID CSCtf08873 which states that a CDP packet with a long Device ID crashes CDPD on N7k. Our research indicated that the vulnerability corrupts the state of the heap, leading to an exploitable scenario, which allows to gain administrator privileges. This module exploits such vulnerability in order to install an agent. This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation. NOCVE-9999-48401 Exploits/Remote none
Cisco Linksys PlayerPT ActiveX Control Buffer Overflow Exploit Update 2 This module exploits a vulnerability in the PlayerPT.ocx module included in the Cisco Linksys WVC200 Wireless-G PTZ Internet Video Camera application. The exploit is triggered when the SetSource() method processes a crafted argument resulting in a buffer overflow. This update improves the xml of the module to be compatible with new product functionality. CVE-2012-0284 Exploits/Client Side Windows
Cisco Linksys PlayerPT ActiveX Control Buffer Overflow Exploit Update This module exploits a vulnerability in the PlayerPT.ocx module included in the Cisco Linksys WVC200 Wireless-G PTZ Internet Video Camera application. The exploit is triggered when the SetSource() method processes a crafted argument resulting in a buffer overflow. This update adds support for Internet Explorer 8 and 9 and Windows 7, detected automatically. CVE-2012-0284 Exploits/Client Side Windows
Cisco Linksys PlayerPT ActiveX Control Buffer Overflow Exploit This module exploits a vulnerability in the PlayerPT.ocx module included in the Cisco Linksys WVC200 Wireless-G PTZ Internet Video Camera application. The exploit is triggered when the SetSource() method processes a crafted argument resulting in a buffer overflow. CVE-2012-0284 Exploits/Client Side Windows
Cisco ASA SNMP Buffer Overflow Exploit (EXTRABACON) The module exploit a buffer overflow vulnerability in the SNMP code of the Cisco ASA CVE-2016-6366 Exploits/Remote none
Chilkat ActiveX Remote Code Execution Exploit This module exploits a Remote Arbitrary File Creation/Execution vulnerability in the AppendBinary and SaveToFile function in Chilkat to deploy an agent. CVE-2008-5002 Exploits/Client Side Windows
Chasys Media Player Playlist Buffer Overflow Exploit Chasys Media Player contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in Chasys Media Player when handling .M3U or .PLS files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .M3U or .PLS file. NOCVE-9999-38411 Exploits/Client Side Windows
Chasys Draw IES BMP Image Processing Buffer Overflow Exploit The vulnerability is caused due to a boundary error within flt_BMP.dll when processing BMP images and can be exploited to cause a stack-based buffer overflow via specially crafted "biPlanes" and "biBitCount" fields. CVE-2013-3928 Exploits/Client Side Windows