Core Certified Exploits

Expert validated exploits for safe and effective pen tests

Exploit development can be an advanced penetration testing skill that takes time to master. Additionally, when on a job, pen testers often don’t have the resources to create a new exploit. Many resort to searching for and using pre-written exploits that have not been tested and must go through the timely effort of quality assurance testing in order to ensure they are secure and effective. 

Core Impact users can save time by finding all the up-to-date exploits they need in one place. We provide a robust library of exploits designed to enable pen testers to safely and efficiently conduct successful penetration tests. Whether written by our own internal team or by a third party like ExCraft, you can trust they have been thoroughly tested and validated by our experts.

Stay Informed of New Core Certified Exploits

Subscribe to receive regular email updates on new exploits available for Core Impact

 

Browse the Core Certified Exploit Library

We provide pen testers with real-time updates for a wide range of exploits for different platforms, operating systems, and applications. 

 

Search our continuously growing library to discover an exploit that will allow you to gain and retain access on the target host or application.

Title Description Date Added CVE Link Exploit Platform Exploit Type Product Name
QuickHMI Directory Traversal Vulnerability This module exploits a directory traversal vulnerability in QuickHMI professional SCADA September 29, 2020 Windows Exploits / Remote SCADAPRO
Advantech WebAccess Change Password Exploit This module exploits hardcoded password vulnerability in Carel PlantVisorPro 2.0. September 29, 2020 Exploits / Authentication Weakness SCADA
Elipse SCADA ActiveReports Remote File Delete Exploit This module will receive HTTP requests from vulnerable clients and install agents on them. September 29, 2020 Exploits / Client Side SCADA
C3-ilex EOScada DoS Remote Denial Of Service in C3-ilex Scada September 29, 2020 Windows Denial of Service / Remote SCADA
ICONICS Genesis HMI SCADA Denial of Service Remote Denial Of Service in GenBroker.exe version 9.00.166.01 for Windows (32-bit) on windows xp sp3 rus September 29, 2020 Windows Denial of Service / Remote SCADAPRO
TraceMode Runtime Monitor UDP Type Remote DoS Remote Denial Of Service in TraceMode Runtime Monitor. September 29, 2020 Windows Denial of Service / Remote SCADA
PlantVisor Remote Command Execution This module exploits a directory traversal vulnerability that leads to command execution. September 29, 2020 Windows Exploits / Remote SCADA
Yokogawa CENTUM CS 3000 Denial of Service Denial of service Yokogawa CENTUM CS 3000 Exploit September 29, 2020 Windows Denial of Service / Remote SCADA
Atvise webMI2ADS Null Pointer Remote DoS Remote Denial Of Service in Atvise webMI2ADS server. September 29, 2020 Windows Denial of Service / Remote SCADA
VxWorks TCP Urgent pointer underflow vulnerability Remote VxWorks 6.8 Denial of Service September 29, 2020 Windows Denial of Service / Remote SCADA
Ge Fanuc Cimplicity Web Server Remote DoS Remote Denial Of Service in Cimplcity webserver. September 29, 2020 Windows Denial of Service / Remote SCADA
RuggedCom Devices Backdoor Access RuggedCom Devices Backdoor Access September 29, 2020 Exploits / Tools SCADA
Sunway AngelServer Denial of Service Denial of service ForceControl DoS Exploit September 29, 2020 Windows Denial of Service / Remote SCADA
Siemens WinCC Flexible Hmiload.exe DoS Remote Denial Of Service in Siemens WinCC Flexible hmiload.exe server. September 29, 2020 Windows Denial of Service / Remote SCADA
Carel PlantVisorPro SQLInjection Exploit This module exploits SQLInjection vulnerability in Carel PlantVisorPro 2.0. September 29, 2020 Exploits / SQL Injection SCADA
OPCSystems Service Remote DoS Remote Denial Of Service in OPCSystems OPCSystemsService.exe server. September 29, 2020 Windows Denial of Service / Remote SCADA
Lytec 2014 Medical Billing Remote Arbitrary File Overwrite This module will receive HTTP requests from vulnerable clients and install agents on them. September 29, 2020 Exploits / Client Side MEDICAL
Advantech WebAccess Multiple Activex Exploit This module will listen HTTP requests from vulnerable clients and install an agent on them. September 29, 2020 Exploits / Client Side SCADA
Siemens WinCC Flexible Miniweb Directory Traversal Vulnerability This module exploits a directory traversal vulnerability in Siemens WinCC Flexible webserver (miniweb.exe). September 29, 2020 Windows Exploits / Remote SCADA
Siemens WinCC Flexible Miniweb.exe DoS Remote Denial Of Service in Siemens WinCC Flexible miniweb.exe server. September 29, 2020 Windows Denial of Service / Remote SCADA
Microsoft Windows Netlogon CVE-2020-1472 Vulnerability Checker An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'. This module tries to determine remotely, if the target host is either vulnerable to CVE-2020-1472 or not. September 15, 2020 Windows Information gathering / Vulnerability checkers Impact
Microsoft Windows DNS Server SIGRed Local Privilege Escalation Exploit An elevation of privilege vulnerability exists in Windows when the DNS server fails to properly handle SIG responses. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. September 15, 2020 Windows Exploits / Local Impact
Docker Desktop Local Privilege Escalation Exploit Docker Desktop allows local privilege escalation to NT AUTHORITY\SYSTEM because it mishandles the collection of diagnostics with Administrator privileges, leading to arbitrary DACL permissions overwrites and arbitrary file writes. This affects Docker Desktop Enterprise before 2.1.0.9, Docker Desktop for Windows Stable before 2.2.0.4, and Docker Desktop for Windows Edge before 2.2.2.0

September 8, 2020 Windows Exploits / Local Impact
Microsoft SharePoint Server DataSet Deserialization Remote OS Command Injection Exploit (CVE-2020-1147) A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the process responsible for deserialization of the XML content. September 1, 2020 Windows Exploits / OS Command Injection / Known Vulnerabilities Impact
AXIS Media Control ActiveX Remote Arbitrary File Owerwrite This module will receive HTTP requests from vulnerable clients and install agents on them. August 31, 2020 Exploits / Client Side IOT