Core Certified Exploits

We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Subscribe to receive regular updates by email:

 

Browse All Exploits

 

 

Title Description Date Added CVE Link Exploit Platform Exploit Type
WECON LeviStudioU MulStatus szFilename Exploit The specific flaw exists within the handling of XML files. When parsing the szFilename attribute of the MulStatus element. May 11, 2020 Windows Exploits / Client Side
Windows Search Indexer get_RootURL Race Condition Privilege Escalation Exploit A race condition exists in Windows Search Indexer, when the put_RootURL function wrote a user-controlled data in the memory of CSearchRoot+0x14.AT the same time, the get_RootURL function read the data located in the memory of CSearchRoot+0x14.



The vulnerability was caused by the access to a shared variable between two different methods of the same instance .
May 5, 2020 Windows Exploits / Local
Fuji Electric V-Server Lite VPR File Parsing Overflow Exploit The specific flaw exists within the processing of VPR files. April 30, 2020 Windows Exploits / Client Side
Open-AudIT m_devices.php Remote PHP File Upload Vulnerability Exploit The sub_resource_create function of class M_devices in m_devices.php of Open-AudIT 3.2.2 allows remote authenticated users to upload arbitrary PHP files, allowing the execution of arbitrary php code in the system. April 29, 2020 Windows, Linux Exploits / Remote File Inclusion / Known Vulnerabilities
Microsoft Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability Exploit An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status and take control of an affected system. April 28, 2020 Windows Exploits / Local
Kinetica Admin getLogs Function Remote OS Command Injection Exploit The Kinetica Admin web application did not properly sanitise the input for the function getLogs. This lack of sanitisation could be exploited to allow an authenticated attacker to run remote code on the underlying operating system. April 20, 2020 Linux Exploits / OS Command Injection / Known Vulnerabilities
Microsoft Windows SMBv3 SMBGhost Elevation of Privilege Vulnerability Exploit An unauthenticated attacker can connect to the target system using SMBv3 and sends specially crafted requests to exploit the vulnerability. This module exploits this vulnerability in the local system in order to achieve an elevation of privilege. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. April 15, 2020 Windows Exploits / Local
Microsoft Windows SMBv3 CoronaBlue Vulnerability DoS Update An unauthenticated attacker can connect to the target system using SMBv3 and sends specially crafted requests to exploit the vulnerability.

The module exploits this vulnerability in order to generate a Denial of Service

This update contains minor fixes to it
April 7, 2020 Windows Denial of Service / Remote
Microsoft Windows Ws2ifsl UaF Local Privilege Escalation Exploit An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability' April 1, 2020 Windows Exploits / Local
Microsoft Windows Installer Elevation of Privilege Vulnerability Exploit An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links. An attacker who successfully exploited this vulnerability could bypass access restrictions to add or remove files. March 30, 2020 Windows Exploits / Local
Delta Industrial Automation CNCSoft ScreenEditor DPB File Parsing Buffer Overflow Exploit

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Industrial Automation CNCSoft ScreenEditor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.


March 26, 2020 Windows Exploits / Client Side
OpenSMTPD Remote Code Execution Exploit smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation. March 26, 2020 Linux Exploits / Remote
Microsoft Windows SMBv3 CoronaBlue Vulnerability DoS An unauthenticated attacker can connect to the target system using SMBv3 and sends specially crafted requests to exploit the vulnerability.

This module exploits this vulnerability in order to generate a Denial of Service
March 20, 2020 Windows Denial of Service / Remote
Microsoft Windows Service Tracing Privilege Escalation Exploit (CVE-2020-0668) An arbitrary privileged file move operation exists in Microsoft Windows Service Tracing. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.



To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.



The security update addresses the vulnerability by ensuring the Windows Kernel properly handles objects in memory.
March 18, 2020 Windows Exploits / Local
Microsoft Exchange Validation Key Remote OS Command Injection Exploit Update Improvements .NET deserialization vulnerability in the Microsoft Exchange Control Panel web page allows authenticated attackers to execute OS commands with SYSTEM privileges.

The lack of randomization in the validationKey and decryptionKey values at installation allows an attacker to create a crafted viewstate to execute OS commands via .NET deserialization.
March 13, 2020 Exploits / OS Command Injection / Known Vulnerabilities
Integard Pro NoJs Parameter Buffer Overflow Exploit Integard Pro is prone to a buffer overflow when handling a specially crafted HTTP POST request. March 10, 2020 Windows Exploits / Remote
CORSAIR iCUE Driver Local Privilege Escalation Exploit The CorsairLLAccess64.sys and CorsairLLAccess32.sys drivers in CORSAIR iCUE before 3.25.60 allow local non-privileged users (including low-integrity level processes) to read and write to arbitrary physical memory locations, and consequently gain NT AUTHORITY\SYSTEM privileges, via a function call such as MmMapIoSpace. March 10, 2020 Windows Exploits / Local
Microsoft Exchange Validation Key Remote OS Command Injection Exploit .NET deserialization vulnerability in the Microsoft Exchange Control Panel web page allows authenticated attackers to execute OS commands with SYSTEM privileges.

The lack of randomization in the validationKey and decryptionKey values at installation allows an attacker to create a crafted viewstate to execute OS commands via .NET deserialization.
March 9, 2020 Windows Exploits / OS Command Injection / Known Vulnerabilities
Viper RGB Driver Read Write IO Ports DoS Update This update adds the CVE number. March 3, 2020 Windows Denial of Service / Local
Microsoft SQL Server Reporting Services Remote OS Command Injection Exploit A deserialization vulnerability in Microsoft SQL Server Reporting Services allows an authenticated attacker to execute arbitrary commands in the context of the Report Server service account. March 3, 2020 Windows Exploits / OS Command Injection / Known Vulnerabilities
Viper RGB Driver Kernel Buffer Overflow Local Privilege Escalation Exploit This module exploits a buffer overflow vulnerability in Viper RGB MsIo64.sys vulnerability allows unprivileged local users to execute code with SYSTEM privileges. February 17, 2020 Windows Exploits / Local
Viper RGB Driver Read Write IO Ports DoS The IOCTL Codes 0x80102050 and 0x80102054 allow a low privileges user to read/write 1/2/4 bytes from/to an IO port. This could be leveraged in a number of ways to ultimately run code with elevated privileges. February 17, 2020 Windows Denial of Service / Local
Microsoft Windows CoreShellComServerRegistrar Open Process Local Privilege Escalation Exploit An elevation of privilege vulnerability exists when Windows Core Shell COM Server Registrar improperly handles COM calls. An attacker who successfully exploited this vulnerability could potentially set certain items to run at a higher level and thereby elevate permissions.



To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.


February 13, 2020 Windows Exploits / Local
Cisco Data Center Network Manager HostEnclHandler getVmHostData SQL Injection Vulnerability Exploit Update This module uses an authentication bypass and a SQL injection vulnerability in order to upload and execute a JSP file in the Wildfly virtual file system webapps directory.



This update fixes OS detection when detecting DCNM version.
February 5, 2020 Windows, Linux Exploits / Authentication Weakness / Known Vulnerabilities
Microsoft Windows Remote Desktop DejaBlue DoS A denial of service vulnerability exists in Remote Desktop Services -formerly known as Terminal Services- when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. February 5, 2020 Windows Denial of Service / Remote