Core Impact Threat Intelligence Exploits, Security and Penetration Testing Updates
When you buy Core Impact, we provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.
Use the controls below to navigate Core Impact exploits and other modules.
|MSRPC Server Service Remote Buffer Overflow Exploit (MS08-067) Update 4||
This module exploits a vulnerability in the Microsoft Windows Server service by sending a specially crafted RPC request. This update adds reliability to all supported platforms.
|EMC AlphaStor Server Agent Buffer Overflow Exploit||
Multiple stack-based buffer overflows in the Command Line Interface process in the Server Agent in EMC AlphaStor 3.1 for Windows allow remote attackers to execute arbitrary code via crafted TCP packets to port 41025.
|ACDSee Products TIFF Buffer Overflow Exploit||
Multiple ACDSee products are prone to a buffer-overflow vulnerability because they fail to perform adequate boundary checks when processing a malformed TIF image.
|FreeBSD ktimer Local Privilege Escalation Exploit||
FreeBSD is prone to a local privilege-escalation vulnerability because it fails to adequately bounds-check user-supplied data.
An attacker can exploit this vulnerability to run arbitrary code with elevated privileges.
|Apple CUPS HP-GL2 filter Remote Code Execution Exploit Update||
This module exploits a specific flaw in the Hewlett-Packard Graphics Language
-Linux Support added
|CVE-2008-3641||Exploits/Remote||Linux, Mac OS X|
|OpenBSD PF IP ICMPV6 Remote DoS||
OpenBSD's PF is prone to a remote denial-of-service vulnerability.
Exploiting this issue allows remote attackers to cause a kernel panic on affected computers, denying further service to legitimate users.
|NOCVE-9999-37988||Denial of Service/Remote||OpenBSD|
|SDP Downloader ASX Buffer Overflow Exploit||
SDP Downloader contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in SDP Downloader when handling crafted .ASX files.
|Apple CUPS IPP_TAG_UNSUPPORTED Handling null pointer DoS||
This module exploits a vulnerability in Apple CUPS, when handling the IPP_TAG_UNSUPPORTED which could be exploited by attackers to cause a remote pre-authentication denial of service.
|CVE-2009-0949||Denial of Service/Remote||Linux, Mac OS X|
|BS Player BSL Buffer Overflow Exploit||
BS Player contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error when handling crafted .BSL files.
|D-Link TFTP Transporting Mode Buffer Overflow Exploit||
D-Link TFTP Server 1.0 allows remote attackers to cause a buffer overflow via a long GET request, which triggers the vulnerability.
|EZip Wizard Buffer Overflow Exploit update||
A stack-based buffer overflow in eZip Wizard allows an attacker to execute arbitrary code via a crafted .ZIP file that contains a file with a long name.
|UltraISO CCD and IMG Buffer Overflow Exploit||
A stack-based buffer overflow in UltraISO allows an attacker to execute arbitrary code via crafted .CCD and .IMG file.
|Steamcast GET Request Remote Buffer Overflow Exploit||
A boundary error can be exploited to cause a stack-based buffer overflow by sending a specially crafted GET HTTP request with an overly long path to the web server.
|AIX Setlocale Function Local Privilege Escalation Exploit||
The AIX Setlocale Function is prone to a local privilege-escalation vulnerability.
A local attacker may be able to exploit this issue to gain elevated privileges on the affected computer. A successful exploit will lead to the complete compromise of the affected computer.
|Microsoft Office PowerPoint PPT 7 Memory Corruption Exploit (MS09-017)||
This module exploits a stack overflow on "pp7x32.dll" when it parses an inconsistent record length in sound data in a file that uses a PowerPoint 95 (PPT95) native file format.
|Ston3d Player Command Injection Exploit||
This module exploits a remote command injection vulnerability in Ston3DWebPlayer and Ston3DStandalonePlayer via an specially crafted STK file.
|CVE-2009-1792||Exploits/Client Side||Windows, Linux|
|Lotus Notes WPD File Processing Buffer Overflow Exploit||
This module exploits a buffer overflow vulnerability in Lotus Notes 8.0 when parsing a malformed, specially crafted WPD (Word Perfect Document) file.
|Mambo output Remote File Inclusion Exploit||
A remote file inclusion vulnerability is present in Mambo. /includes/Cache/Lite/Output.php doesn't sanitize the $mosConfig_absolute_path before using it in an include.
|CVE-2008-2905||Exploits/Remote File Inclusion/Known Vulnerabilities|
|XBMC GET Request Remote Buffer Overflow Exploit||
This module exploits a vulnerability in XBMC by sending a specially crafted, overly long HTTP GET request to the application's web server which causes a stack-based buffer overflow, allowing arbitrary code execution.
|Microsoft Office Powerpoint PPT 4.0 Importer Buffer Overflow Exploit (MS09-017)||
This module exploits a stack-based based overflow in Microsoft Office Powerpoint when parsing a malformed .PPT 4.0 file with a specially crafted printer name.
|ElbyCDIO IO Driver Privilege Escalation Exploit||
This module exploits a vulnerability in ElbyCDIO.SYS driver when handling a specially crafted IOCTL request. The vulnerability allows local users to overwrite memory and execute arbitrary code via malformed Interrupt Request Packet (Irp) parameters.
|FreeBSD Telnetd Privilege Escalation Exploit||
Local attackers can exploit this issue to execute arbitrary code with superuser privileges. Successfully exploiting this issue will facilitate in the complete compromise of affected computers.
|IBM Director CIM Server Privilege Escalation Exploit||
IBM Director is prone to a privilege-escalation vulnerability that affects the CIM server. Attackers can leverage this issue to execute arbitrary code with elevated privileges in the context of the CIM server process.
|SAP AG SAPgui EAI WebViewer3D Buffer Overflow Exploit||
This module exploits a stack overflow in Siemens Unigraphics Solutions Teamcenter Visualization EAI WebViewer3D ActiveX control that is bundled with SAPgui. When parsing an overly long string the SaveViewToSessionFile() method, arbitrary code may be executed.
|AstonSoft DeepBurner DBR Compilation Buffer Overflow Exploit||
AstonSoft DeepBurner is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before using it in a memory copy operation.
|Talkative IRC PRIVMSG Buffer Overflow Exploit||
Talkative IRC is prone to a stack-based buffer-overflow vulnerability because it fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.
|VUPlayer CUE Buffer Overflow Exploit||
VUPlayer contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error when handling .CUE files.
|Sun xVM VirtualBox Exploit||
This module exploits a local privilege escalation vulnerability in certain packages shipped with Sun xVM VirtualBox for the Linux platform.
|Rosoft Media Player M3U Buffer Overflow Exploit Update||
Rosoft Media Player is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input of M3U files.
|GNOME Dia PySys_SetArgv Remote Command Execution Exploit||
A design error has been discovered in GNOME's Dia, which can be exploited by sending a malicious file to vulnerable victims.