Core Impact Threat Intelligence Exploits, Security and Penetration Testing Updates
When you buy Core Impact, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.
Use the controls below to navigate Core Impact exploits and other modules.
|Linux Kernel Dirty COW Race Condition Privilege Escalation Exploit||
This module exploits a race condition vulnerability in the Linux Kernel via MAP_PRIVATE COW.
The bug relies in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.
WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
|PowerFolder Server commons-collections Java Library Deserialization Vulnerability Remote Code Execution Exploit||
PowerFolder Server is prone to a remote vulnerability that allows attackers to take advantage of a deserialization vulnerability present in the commons-collections Java library.
|Cisco ASA SNMP Buffer Overflow Exploit (EXTRABACON)||
The module exploit a buffer overflow vulnerability in the SNMP code of the Cisco ASA
|VX Search Enterprise Buffer Overflow Exploit||
Vx Search Enterprise is prone to a buffer overflow vulnerability when receive a crafted request.
|Samsung Security Manager Apache Felix Gogo Vulnerability Local Privilege Escalation Exploit||
Samsung Security Manager is prone to a privilege-escalation vulnerability that affects Apache Felix Gogo runtime. Due to an insecure default installation of the runtime, an attacker could then send commands that will be executed by the mentioned runtime.
|Disk Pulse Enterprise Server POST Request Buffer Overflow Exploit||
Disk Pulse server is prone to a buffer-overflow vulnerability when handling a crafted POST request, this can trigger an overflow in a finite-sized internal memory buffer, and install an agent with SYSTEM priviledges.
|OracleDB DBMS AW.EXECUTE CDA Command Remote Stack Overflow Exploit Update||
Oracle Database Server Core RDBMS component is prone to a remote vulnerability that allows attackers to exploit a stack-based buffer overflow in the EXECUTE procedure of DBMS_AW.
This update fixes a variable referenced before assignment bug.
|Cisco Prime Infrastructure Java Object Deserialization Remote Code Execution Exploit||
Cisco Prime Infrastructure 1.2.0 through 2.2(2) and Cisco Evolved Programmable Network Manager (EPNM) 1.2 allow remote attackers to execute arbitrary code via crafted deserialized data in an HTTP POST request, aka Bug ID CSCuw03192.
|OpenNMS Platform Java Object Deserialization Remote Code Execution Exploit||
OpenNMS Platform is prone to a remote vulnerability that allows attackers to take advantage of an insecure deployment of the JMX/RMI service used to manage and monitor the Java Virtual Machine.
|Rockwell Automation Connected Components Workbench Arbitrary Write Exploit||
The specific flaw exists within the RA.ViewElements.Row.1 ActiveXControl method (PanelDevice.dll). By providing a malicious value to the BackColor property.
|Microsoft Windows xxxInsertMenuItem Out-Of-Bounds Exploit (MS16-098)||
This module exploits a vulnerability in win32k.sys by creating special Windows menues with crafted parameters.
|SugarCRM REST Unserialize PHP Exploit||
This module exploits an unauthenticated PHP Injection vulnerability abusing the unserialize() function.
|NOCVE-9999-79965||Exploits/OS Command Injection/Known Vulnerabilities||Linux|
|Schneider Electric SoMachine HVAC AxEditGrid ActiveX Exploit||
The specific flaw exists within the SetDataIntf method of the AxEditGrid control. The control has an untrusted pointer dereference vulnerability because it blindly calls an attacker-supplied memory address.
|phpMyAdmin Post Auth Remote Code Exploit||
phpMyAdmin is prone to a regexp abuse via an eval modifier which can be found in old PHP versions. This vulnerability allows authenticated attackers to run arbitrary php code on the affected server.
|CVE-2016-5734||Exploits/OS Command Injection/Known Vulnerabilities||Linux|
|WebNMS Framework Server Arbitrary File Upload Vulnerability Exploit||
A vulnerability exists in the FileUploadServlet servlet of WebNMS Framework Server. This servlet allows unauthenticated file uploads. By uploading a JSP file, an attacker can achieve remote code execution.
|ActiveMQ STOMP Protocol Unsafe Deserialization Exploit||
JMS Object messages within Apache ActiveMQ depend on Java Serialization for marshaling/unmashaling of the message payload. This lead to execution of untrusted code when a specially crafted object is received.
This update introduces an exploit that will attempt to connect using the STOMP protocol and abuse the vulnerability to execute a Core Impact agent in the vulnerable system.
|Eaton ELCSoft ELCSimulator Buffer Overflow Exploit||
The specific flaw exists within the processing of network TCP requests by ELCSimulator.exe. A crafted request will cause a stack buffer overflow.
|Microsoft Windows CreateSizedDIBSECTION Thumbnail View Buffer Overflow Exploit Update||
Microsoft Windows is prone to a stack-based buffer-overflow vulnerability in the Windows Graphics Rendering Engine because the software fails to perform adequate boundary-checks on user-supplied data.
|IBM Lotus Quickr For Domino qp2 ActiveX Control Heap Overflow Exploit Update||
A heap overflow in the ActiveX control qp2.cab in IBM Lotus Quickr for Domino allows remote attackers to execute arbitrary code via a crafted argument to the Attachment_Names method.
This update reduces user interaction, automating the focus of the mouse in the created window object.
|Microsoft Windows MRXDAV.SYS WebDav Privilege Escalation Exploit (MS16-016)||
This module exploits a vulnerability in Microsoft Windows MRXDAV.SYS driver. This vulnerability allows a local attacker to execute arbitrary code with SYSTEM privileges in a vulnerable target.
|Linux Kernel netfilter target_offset Privilege Escalation Exploit||
This module exploits a vulnerability in the Linux kernel related to the netfilter target_offset field. This vulnerability can be exploited by a local unprivileged attacker to gain root privileges.
|Microsoft Internet Explorer Typed Array Detached ArrayBuffer Use-After-Free Exploit (MS16-063)||
Internet Explorer is prone to a use-after-free vulnerability when trying to access the ArrayBuffer that was backing a Typed Array after it has been detached by transferring it to a Web Worker by calling the postMessage() function.
|Wireshark riched20 DLL Hijacking Exploit||
The vulnerability is caused due to the application loading a library
|Reprise License Manager akey Buffer Overflow Vulnerability||
The vulnerability is caused due to a boundary error when handling the
|Ruby on Rails Action Pack Inline Exec Exploit||
Action Pack in Ruby on Rails allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
|CVE-2016-2098||Exploits/OS Command Injection/Known Vulnerabilities||Linux|
|JBoss EJBInvokerServlet Java Deserialization Vulnerability Remote Code Execution Exploit||
JBoss Application Server is prone to a remote vulnerability due to deserialization of untrusted inputs, allowing attackers to instantiate arbitrary java objects leading to remote code execution.
|NOCVE-9999-75005||Exploits/Remote Code Execution||Windows, Linux|
|Symantec Endpoint Manager PowerPoint Misaligned Stream-Cache Privilege Escalation Exploit||
The vulnerability resides in parsing crafted Microsoft PowerPoint documents and produces a buffer overflow in the stack, leading to a privilege escalation to System.
|Microsoft Windows WPAD BadTunnel Exploit (MS16-077)||
This module exploits a vulnerability in Windows Netbios cache by flooding crafted NBNS responses.
|Drupal RESTWS Module PHP Remote Command Injection Exploit||
RESTWS alters the default page callbacks for entities to provide additional functionality. A vulnerability in this approach allows an unauthenticated attacker to send specially crafted requests resulting in arbitrary PHP execution.
|NOCVE-9999-75002||Exploits/OS Command Injection/Known Vulnerabilities||Linux|
|Jenkins JRMP Java Library Deserialization Vulnerability Remote Code Execution Exploit||
The remoting module in Jenkins before 1.650 and LTS before 1.642.2 allows remote attackers to execute arbitrary code by opening a JRMP listener.