Core Certified Exploits

We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Subscribe to receive regular updates by email:

 

Browse All Exploits

 

 

Title Description Date Added CVE Link Exploit Platform Exploit Type
Windows Error Reporting Manager Arbitrary File Move Elevation of Privilege Exploit (CVE-2019-1315) An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles hard links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status.



To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.


January 31, 2020 Windows Exploits / Local
MSI Afterburner RTCore64 Privilege Escalation Exploit The driver in Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. January 27, 2020 Windows Exploits / Local
Cisco Data Center Network Manager HostEnclHandler getVmHostData SQL Injection Vulnerability Exploit This module uses an authentication bypass and a SQL injection vulnerability in order to upload and execute a JSP file in the Wildfly virtual file system webapps directory. January 22, 2020 Windows, Linux Exploits / Authentication Weakness / Known Vulnerabilities
Citrix ADC and Gateway Directory Traversal Vulnerability Exploit Citrix Application Delivery Controller (ADC) and Citrix Gateway are prone to a directory traversal vulnerability that allows attackers to upload an XML file via newbm.pl and execute system commands. January 14, 2020 FreeBSD Exploits / Remote
Microsoft Windows Win32k xxxMNFindWindowFromPoint Vulnerability Exploit An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. January 10, 2020 Windows Exploits / Local
Linux PTRACE_TRACEME Local Privilege Escalation Exploit In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). January 6, 2020 Linux Exploits / Local
Microsoft Windows UPnP Device Host Local Privilege Escalation Exploit This module exploits two vulnerabilities (CVE-2019-1405 & CVE-2019-1322) in order to get SYSTEM privileges. The first one "UPnP Device Host" allows us to get SERVICE privileges. The second one "Update Orchestrator Service" allows us to escalate from SERVICE to SYSTEM. December 30, 2019 Windows Exploits / Local
File Sharing Wizard POST Method Exploit File Sharing Wizard is prone to a buffer-overflow when handling a specially crafted HTTP POST parameter. December 27, 2019 Windows Exploits / Remote
Viper RGB Driver Kernel Arbitrary Read Write Local Privilege Escalation Exploit The MsIo64.sys and MsIo32.sys drivers in Patriot Viper RGB allow local users (including low integrity processes) to read and write to arbitrary memory locations, and consequently gain NT AUTHORITY\SYSTEM privileges, by mapping \Device\PhysicalMemory into the calling process via ZwOpenSection and ZwMapViewOfSection. December 18, 2019 Windows Exploits / Local
Microsoft Windows Remote Desktop Protocol BlueKeep DoS Update A Denial of Service exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests.

This update corrects wrong category specification.
December 17, 2019 Windows Denial of Service / Remote
Robot Attack Vulnerability Analyzer This module will send various malformed messages over ssl to the target service in order to detect a discrepancy between the server's responses, if this is the case, it will mark said target as vulnerable to this kind of attacks (ROBOT attack) December 4, 2019 Linux Information gathering / Vulnerability checkers
Microsoft Internet Explorer Scripting Engine Memory Corruption Exploit A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. December 3, 2019 Windows Exploits / Client Side
Apache Solr ENABLE_REMOTE_JMX_OPTS JMX-RMI Remote Code Execution Exploit Apache Solr is prone to a remote vulnerability that allows attackers to take advantage of an insecure deployment of the JMX/RMI service used to manage and monitor the Java Virtual Machine.

By exploiting known methods, it is possible to remotely load an MLet file from an attacker controlled web server that points at a jar file.
November 27, 2019 Linux Exploits / Remote
WECON LeviStudioU SMtext Buffer Overflow Exploit The specific flaw exists within the handling of XML files. When parsing the ShortMessage SMtext element, the process does not properly validate the length of user-supplied data prior to copying it to a buffer. November 20, 2019 Windows Exploits / Client Side
AVEVA InduSoft Web Studio Remote Command Injection Exploit Unauthenticated remote command injection vulnerability in Indusoft Web Studio 8.1 SP2. The vulnerability is exercised via the custom remote agent protocol that is typically found on port 1234 or 51234. An attacker can issue a specially crafted command 66 which causes IWS to load a DB connection file off of a network share using SMB. The DB file can contain OS commands that will be executed at the privilege level used by IWS. November 15, 2019 Windows Exploits / Remote
Microsoft Windows Remote Desktop Protocol BlueKeep Use After Free Exploit Update 2 This update adds support for Windows 7 SP1 x64. November 13, 2019 Windows Exploits / Remote
SolarWinds Dameware Mini Remote Control Unauthenticated RCE Exploit The Solarwinds Dameware Mini Remote Client agent supports smart card authentication by default which allows a user to upload an executable to be executed on the DWRCS.exe host. An unauthenticated, remote attacker can request smart card login and upload and execute an arbitrary executable. November 7, 2019 Windows Exploits / Remote
rConfig ajaxServerSettingsChk and search_crud Remote OS Command Injection Exploit An unauthenticated OS command injection vulnerability in rConfig using the rootUname parameter present in ajaxServerSettingsChk.php allows an attacker to send a request that will attempt to execute OS commands with permissions of the rConfig process on the host system.

Also, an authenticated OS command injection vulnerability using the catCommand parameter present in search.crud.php allows an attackers to do the same as previous, but credentials are required.

November 7, 2019 Linux Exploits / OS Command Injection / Known Vulnerabilities
Apache Solr Velocity Template Remote OS Command Injection Exploit Update A vulnerability in the Apache Solr Velocity template allows unauthenticated attackers to execute arbitrary OS commands.



This update adds automatic core name detection and newer supported versions.
November 6, 2019 Windows, Linux Exploits / OS Command Injection / Known Vulnerabilities
Kibana Timelion Visualizer Remote Javascript OS Command Injection Exploit An arbitrary code execution vulnerability in the Kibana Timelion visualizer allows an attacker with access to the application to send a request that will attempt to execute javascript code with permissions of the Kibana process on the host system. November 4, 2019 Linux Exploits / OS Command Injection / Known Vulnerabilities
Linux Kernel libfutex Privilege Escalation Exploit Update This module has improvements for the Linux Kernel libfutex exploit. November 1, 2019 Linux Exploits / Local
Apache Solr Velocity Template Remote OS Command Injection Exploit A vulnerability in the Apache Solr Velocity template allows unauthenticated attackers to execute arbitrary OS commands. November 1, 2019 Windows, Linux Exploits / OS Command Injection / Known Vulnerabilities
Disk Pulse Enterprise Import Command Local Buffer Overflow Exploit A Buffer Overflow exists when parsing .XML files by Command Import. The vulnerability is caused due to a boundary error when handling a crafted .XML files. October 31, 2019 Windows Exploits / Client Side
Advantech WebAccess SCADA GetUserPasswd BwPAlarm Buffer Overflow Exploit The flaw exists in the GetUserPasswd function in BwPAlarm.dll due to improper validation of user-supplied data before copying the data to a fixed size stack-based buffer when processing an IOCTL 70603 RPC message. October 25, 2019 Windows Exploits / Remote
Sudo Root With User ID Local Privilege Escalation Exploit (CVE-2019-14287) This module exploits a flaw in the way sudo implemented running commands with arbitrary user ID. If a sudoers entry is written to allow the attacker to run a command as any user except root, this flaw can be used by the attacker to bypass that restriction. October 19, 2019 Linux Exploits / Local