Core Certified Exploits

Library of expert validated exploits for safe and effective pen tests

Browse the Core Certified Exploit Library  

 

Exploit development can be an advanced penetration testing skill that takes time to master. Additionally, when on a job, pen testers often don’t have the resources to create a new exploit. Many resort to searching for and using pre-written exploits that have not been tested and must go through the timely effort of quality assurance testing in order to ensure they are secure and effective.

Core Impact users can save time by finding all the up-to-date exploits they need in one place. We provide a robust library of exploits designed to enable pen testers to safely and efficiently conduct successful penetration tests. Whether written by our own internal team or by a third party like ExCraft, you can trust they have been thoroughly tested and validated by our experts.

The universe of vulnerabilities is huge and not all of them represent the same risk for the customers. Vulnerabilities do not all have the same level of criticality. Some may be easily exploitable by a low-level user, while others may not be exploitable at all. To increase the efficiency of the attacks and the quality of the exploits provided, the Core Impact team has developed selection criteria to prioritize its analysis and implementation. We determine which exploits warrant creation based on the following questions:

  • What are the most critical attacks from the attacker’s perspective?
  • What new vulnerabilities are more likely to be exploited in real attacks?
  • What exploits are the most valuable for Core Impact?

Once an exploit is approved, its priority order considers the following variables: 

  • Vulnerability Properties: CVE, disclosure date, access mechanism and privileges needed. 
  • Target Environment Setup: OS, application prevalence, version and special configurations needed. 
  • Value Provided to Core Impact: Customer request, usage in multiple attacks, allows the installation of an agent, etc. 
  • Technical Cost vs. Benefit: An analysis weighing the resources needed to build an exploit with the internal and external knowledge gained in its creation. 

Each one of these variables has a different weight and provides a ranking of the potential exploits to be developed. Following those criteria, the top of the list would contain, for example, a vulnerability on Windows (most popular OS) that can be exploited remotely, without authentication and that provides super user privileges. 

Correspondingly, a vulnerability on an application that is rarely installed, needs special configurations, and requires User Interaction, would be at the bottom.

Stay Informed of New Core Certified Exploits

Subscribe to receive regular email updates on new exploits available for Core Impact

Browse the Core Certified Exploit Library

We provide pen testers with real-time updates for a wide range of exploits for different platforms, operating systems, and applications. 

Search our continuously growing library to discover an exploit that will allow you to gain and retain access on the target host or application.

Title Description Date Added CVE Link Exploit Platform Exploit Type Product Name
Roundcube Webmail unserialize PHP Object Deserialization Vulnerability Exploit An authenticated PHP object deserialization vulnerability in Roundcube Webmail allows authenticated remote attackers to execute OS system commands. Linux Exploits / Remote Code Execution Impact
Vite Arbitrary File Read Exploit (CVE-2025-31125) Vite exposes content of non-allowed files using inline&import or raw import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. Linux Exploits / Remote File Disclosure Impact
SIEMENS Solid Edge ST4/ST5 WebPartHelper ActiveX Control Remote Command Execution Exploit This module will receive HTTP requests from vulnerable clients and install agents on them. Exploits / Client Side SCADA
Fiberhome AN5506-04-FA Remote stack overflow Remote Denial Of Service in Fiberhome AN5506-04-FA Router Windows Denial of Service / Remote SCADA
Microsoft Windows library-ms NTLMv2 Information Disclosure Exploit External control of file name or path in Windows NTLMv2 allows an unauthorized attacker to perform spoofing over a network. Windows Exploits / Client Side Impact
IObit Malware Fighter Arbitrary File Delete Exploit The IMF ForceDelete Filter Driver (IMFForceDelete.sys) present in IObit Malware Fighter v12.1.0 allows attackers to arbitrarily delete files. This module allows a local unprivileged user to delete an arbitrary file, regardless of the current user privileges. Windows Exploits / Local Impact
SysAid on-prem GetMdmMessage XML External Entity Remote Code Execution Vulnerability Exploit A XML External Entity vulnerability combined with an authenticated OS command injection in SysAid on-prem allows unauthenticated remote attackers to leak arbitrary files wich may lead to the execution of OS system commands. Windows Exploits / OS Command Injection / Known Vulnerabilities Impact
Windows Hyper-V NT Kernel Integration VSP Privilege Escalation Exploit (CVE-2025-21333) A heap-based buffer overflow exists in the vkrnlintvsp.sys driver within the VkiRootAdjustSecurityDescriptorForVmwp(). The issue occurs due to improper validation of a user-controlled Dacl->AclSize value when calculating a memory allocation size. Windows Exploits / Local Impact
Veeam Backup and Replication Blacklist xmlFrameworkDs NET Deserialization Vulnerability Remote Code Execution Exploit Veeam Backup and Replication deserialization of Veeam.Backup.EsxManager.xmlFrameworkDs .NET class type allows authenticated remote attackers to execute system commands in the context of the NT AUTHORITY\SYSTEM user. Windows Exploits / Remote Code Execution Impact
MajorDoMo 1.2.0b Blind SQL Injection MajorDoMo 1.2.0b Blind SQL Injection Exploits / SQL Injection SCADA
MajorDoMo 1.2.0b Command Injection MajorDoMo 1.2.0b Command Injection Exploits / Remote Code Execution SCADA
MajorDoMo 1.2.0b Remote Code Execution MajorDoMo 1.2.0b Remote Code Execution Windows, Linux Exploits / Remote Code Execution SCADA
CrushFTP WebInterface Auth Bypass Exploit This module exploits an authentication bypass vulnerability in the CrushFTP WebInterface. Versions affected include 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0. The vulnerability allows an unauthenticated attacker to bypass login by crafting a forged CrushAuth cookie and abusing the Authorization header. If a valid username is known (e.g., crushadmin), the attacker can: Retrieve a full list of users via getUserList. Windows, Linux Exploits / Remote Impact
Apache Camel Message Header Injection Vulnerability Remote Code Execution Exploit A message header injection vulnerability in Apache Camel allows unauthenticated remote attackers to execute OS system commands. Windows, Linux Exploits / OS Command Injection / Known Vulnerabilities Impact
PerkinElmer Perten Instruments Process Plus Software Local File Inclusion This module exploits a Local File Inclusion vulnerability in Perten Instruments Process Plus Software Windows Exploits / Remote SCADA
ABB Cylon Aspect Arbitrary File Delete This module exploits a Arbitrary File Delete vulnerability in ABB Cylon Aspect Windows Exploits / Remote SCADA
Microsoft Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Exploit (CVE-2024-30085) The Cloud Files Mini Filter Driver (cldflt.sys) present in Microsoft Windows is vulnerable to a buffer overflow, which can result in out-of-bounds memory write to paged pool memory. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges. Windows Exploits / Local Impact
Windows Error Reporting Privilege Escalation Exploit (CVE-2024-26169) An elevation of privilege vulnerability has been identified in the Windows Error Reporting Service. This security flaw arises from improper privilege management, enabling local attackers with standard user permissions to escalate their privileges and gain unauthorized access to elevated system capabilities. Windows Exploits / Local Impact
SolarWinds Web Help Desk Hardcoded Credentials Vulnerability Checker CVE-2024-28987 affects SolarWinds Web Help Desk 12.8.3 Hotfix 1 and all previous versions due to the presence of hardcoded credentials in the application. This vulnerability allows an unauthenticated attacker to access the REST API using Basic Authentication with predefined credentials (helpdeskIntegrationUser/dev-C4F8025E7), enabling them to read, modify, and create tickets. Windows Information gathering / Vulnerability checkers Impact
Microsoft Windows Common Log File System Driver Elevation of Privilege Vulnerability Exploit (CVE-2024-38196) The Common Log File System Driver (clfs.sys) present in Microsoft Windows is vulnerable to a memory corruption vulnerability. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges by creating a specially crafted base log file. Windows Exploits / Local Impact
Windows Common Log File System Driver LoadContainerQ Elevation of Privilege Vulnerability Exploit This module exploits a vulnerability in the LoadContainerQ function within clfs.sys. The root cause of this vulnerability is that LoadContainerQ uses CLFS_CONTAINER_CONTEXT.pContainer without verifying whether the FlushImage function has invalidated the General Metadata Block. Windows Exploits / Local Impact
Microsoft Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability Exploit (CVE-2024-38144) An elevation of privilege vulnerability exists due to the MS KS WOW Thunk kernel module allowing an integer overflow which can lead into a buffer overflow. The vulnerability could allow an attacker to run code with elevated privileges. Windows Exploits / Local Impact
Microsoft Windows Ancillary Function Driver UAF Privilege Excalation Exploit (CVE-2024-38193) A critical use-after-free vulnerability in the Windows Ancillary Function Driver (afd.sys), allows attackers to escalate privileges. It stems from a race condition in the Registered I/O (RIO) extension for Windows sockets, between the functions AfdRioGetAndCacheBuffer() and AfdRioDereferenceBuffer(). Windows Exploits / Local Impact
Assorted Improvements for Exploits Enhance identity management in exploits. * Linked created identities in the Module Output: Added a reference to the created identity in the Module Output. * Added Validated and Validated in properties to identities: Ensured that created identities include Validated=True and are associated with the target (Validated in) where they were verified. Linux, Windows Exploits / Remote Code Execution Impact
Ivanti Connect Secure IFT_PREAUTH_INIT clientCapabilities Buffer Overflow Remote Code Execution Exploit Ivanti Connect Secure contains a stack-based buffer overflow that allows unauthenticated remote attackers to execute system commands in the context of the nr user. Linux Exploits / Remote Code Execution Impact