Core Certified Exploits

Library of expert validated exploits for safe and effective pen tests

Browse the Core Certified Exploit Library  

 

Exploit development can be an advanced penetration testing skill that takes time to master. Additionally, when on a job, pen testers often don’t have the resources to create a new exploit. Many resort to searching for and using pre-written exploits that have not been tested and must go through the timely effort of quality assurance testing in order to ensure they are secure and effective.

Core Impact users can save time by finding all the up-to-date exploits they need in one place. We provide a robust library of exploits designed to enable pen testers to safely and efficiently conduct successful penetration tests. Whether written by our own internal team or by a third party like ExCraft, you can trust they have been thoroughly tested and validated by our experts.

The universe of vulnerabilities is huge and not all of them represent the same risk for the customers. Vulnerabilities do not all have the same level of criticality. Some may be easily exploitable by a low-level user, while others may not be exploitable at all. To increase the efficiency of the attacks and the quality of the exploits provided, the Core Impact team has developed selection criteria to prioritize its analysis and implementation. We determine which exploits warrant creation based on the following questions:

  • What are the most critical attacks from the attacker’s perspective?
  • What new vulnerabilities are more likely to be exploited in real attacks?
  • What exploits are the most valuable for Core Impact?

Once an exploit is approved, its priority order considers the following variables: 

  • Vulnerability Properties: CVE, disclosure date, access mechanism and privileges needed. 
  • Target Environment Setup: OS, application prevalence, version and special configurations needed. 
  • Value Provided to Core Impact: Customer request, usage in multiple attacks, allows the installation of an agent, etc. 
  • Technical Cost vs. Benefit: An analysis weighing the resources needed to build an exploit with the internal and external knowledge gained in its creation. 

Each one of these variables has a different weight and provides a ranking of the potential exploits to be developed. Following those criteria, the top of the list would contain, for example, a vulnerability on Windows (most popular OS) that can be exploited remotely, without authentication and that provides super user privileges. 

Correspondingly, a vulnerability on an application that is rarely installed, needs special configurations, and requires User Interaction, would be at the bottom.

Stay Informed of New Core Certified Exploits

Subscribe to receive regular email updates on new exploits available for Core Impact

Browse the Core Certified Exploit Library

We provide pen testers with real-time updates for a wide range of exploits for different platforms, operating systems, and applications. 

Search our continuously growing library to discover an exploit that will allow you to gain and retain access on the target host or application.

Title Description Date Added CVE Link Exploit Platform Exploit Type Product Name
Loytec L-Studio 3.0 Arbitrary File Upload Loytec L-Studio 3.0 Remote Code Execution Windows Exploits / Remote Code Execution SCADA
Microsoft Exchange Proxylogon Remote Code Execution Vulnerability Exploit Update A combination of a server-side request forgery vulnerability and an arbitrary file write vulnerability, allows unauthenticated attackers to execute commands with SYSTEM privileges in Microsoft Exchange Server.



This update adds several parameters for module flexibility; more log verbosity on errors and fixes a bug when using autodiscover to retrieve email SID.
Windows Exploits / Remote Code Execution Impact
FileCatalyst Workflow JOBID SQL Injection Vulnerability Exploit A SQL injection vulnerability in Fortra FileCatalyst Workflow versions 5.1.6 build 135 and earlier allows remote attackers, including anonymous ones, to exploit a SQL injection via the JOBID parameter.

This could lead to unauthorized SQL commands execution such as table deletion or admin user creation. This module without authentication creates an administrative user, proceeds to authenticate with this newly created user to assess if the system is vulnerable.
Linux Exploits / Remote Impact
Microsoft Streaming Service Elevation of Privilege Vulnerability Exploit (CVE-2023-36802) Update This update adds reliability improvements to check if the target is vulnerable. Windows Exploits / Local Impact
Progress Telerik Report Server XmlSerializer NET Deserialization Vulnerability Remote Code Execution Exploit An Authentication bypass and a .NET deserialization vulnerability allows unauthenticated remote attackers to execute system commands in Progress Telerik Report Server. Windows Exploits / Authentication Weakness / Known Vulnerabilities Impact
SolarWinds Serv-U FTP Server Path Traversal Vulnerability Exploit An unauthenticated remote attacker could exploit this vulnerability by sending a specially crafted request to a vulnerable server. Successful exploitation would allow an attacker to read files from the underlying operating system, which may include sensitive information such as user data (which may include encrypted passwords) Windows, Linux Exploits / Remote File Disclosure Impact
Schlumberger Olga dynamic multiphase flow simulator Info Disclosure Schlumberger Olga dynamic multiphase flow simulator Info Disclosure Exploits / Client Side SCADA
Aquatronica Control System Information Disclosure Aquatronica Control System Remote Configuration Disclosure Exploits / Client Side SCADA
Xiamen Haiwell Technology, HaiwellHappy Remote Code Execution Vulnerability This module will receive HTTP requests from vulnerable clients and install RCE exploit on them. Exploits / Client Side SCADA
Microsoft Windows CSC Service Elevation of Privilege Vulnerability Exploit The Client Side Caching Driver (csc.sys) present in Microsoft Windows is vulnerable to a memory corruption, which can result in arbitrary memory write. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges. Windows Exploits / Local Impact
Ivanti Connect Secure WEB COMPONENT Unauthenticated Remote Code Execution CVE-2024-21887

An authenticated user can exploit a command injection vulnerability in the web components of Ivanti Connect Secure and Policy Secure (9.x and 22.x) to execute arbitrary commands.



CVE-2023-46805 is an authentication bypass vulnerability in the web component of Ivanti Connect Secure. This vulnerability allows an attacker to bypass control checks and access restricted resources. It affects all supported versions of Ivanti ICS and Policy Secure 9.x and 22.x
Linux Exploits / Remote Code Execution Impact
Oracle WebLogic Server WLS Core Components T3 Remote Code Execution Exploit Update An update for the module Oracle WebLogic WLS Core Components T3 Remote Code Execution Exploit that fixes a problem while using it in a pivoted context. Windows, Linux Exploits / Remote Impact
PHP CGI Argument Injection Vulnerability Remote Code Execution Exploit In PHP, when using Apache and PHP-CGI on Windows and if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow remote attackers to pass options to PHP binary being run, leading to execute system commands in the context of the affected application. Windows Exploits / OS Command Injection / Known Vulnerabilities Impact
Apache HugeGraph Gremlin Script Remote Code Execution Vulnerability Exploit A java unsafe reflection vulnerability present in Gremlin scripting feature of Apache HugeGraph allows remote attackers to execute system commands in the context of the affected application. Linux Exploits / Remote Code Execution Impact
Microsoft Windows InitializeXamlDiagnosticsEx Local Privilege Escalation Exploit An authorized attacker with regular user privileges may be able to inject a malicious file and then convince a user to execute a UWP application.An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows Exploits / Local Impact
Check Point Security Gateway MyCRL Directory Traversal Vulnerability Exploit A directory traversal vulnerability in the /clients/MyCRL endpoint of sslvpn.full allows unauthenticated remote attackers to download system files. Exploits / Remote File Disclosure Impact
LS ELECTRIC XG5000 Software Remote Code Execution Vulnerability This module will receive HTTP requests from vulnerable clients and install RCE exploit on them. Exploits / Client Side SCADA
2WIRE Modems/Routers HomePortal Denial of Service Remote Denial Linksys 2WIRE Modems/Routers Linux Denial of Service / Remote SCADA
Sonatype Nexus Repository Manager WebResourceServiceImpl Directory Traversal Vulnerability Exploit A directory traversal vulnerability in the WebResourceServiceImpl class of org.sonatype.nexus.internal.webresources allows unauthenticated remote attackers to download any file, including system files outside of Sonatype Nexus Repository Manager application scope. Linux Exploits / Remote File Disclosure Impact
Debezium UI 2.5 Credential Disclosure Debezium UI Remote Information Disclosure Exploits / Remote SCADA
PaloAlto PAN-OS GlobalProtect Unmarshal Reflection Vulnerability Checker An unmarshal reflection vulnerability in GlobalProtect feature of Palo Alto Networks PAN-OS software allows unauthenticated remote attackers to create empty arbitrary directories and files in the operating system. If device telemetry is enabled, then remote OS command injection is possible via the dt_curl python module. Linux Information gathering / Vulnerability checkers Impact
CrushFTP Server-side Template Injection Vulnerability Exploit A Server-side Template Injection vulnerability in CrushFTP allows unauthenticated remote attackers to leak server variables values and read arbitrary files in the operating system. This allows authentication bypass of currently logged in users via leak of session tokens by sessions.obj file or log files reading. If the leaked session token is from a CrushFTP administrator user then remote code execution is possible via arbitrary class instantiation vulnerability on the admin panel (dynamic SQL driver loading). Windows, Linux Exploits / Remote Impact
Microsoft Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Exploit The Cloud Files Mini Filter Driver (cldflt.sys) present in Microsoft Windows is vulnerable to a buffer overflow, which can result in out-of-bounds memory write to paged pool memory. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges. Windows Exploits / Local Impact
Advantech ActiveDAQ Pro AdvGraph.dll Remote Code Execution Vulnerability Exploit This module will receive HTTP requests from vulnerable clients and install agents on them. Exploits / Client Side SCADA
ActiveSoft MyBuilder Remote Code Execution Vulnerability This module will listen for HTTP requests from vulnerable clients and queue client side exploits as HTTP responses. Exploits / Client Side SCADA