Core Certified Exploits

We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Subscribe to receive regular updates by email:

 

Browse All Exploits

 

 

Title Description Date Added CVE Link Exploit Platform Exploit Type
WECON LeviStudioU SMtext Buffer Overflow Exploit The specific flaw exists within the handling of XML files. When parsing the ShortMessage SMtext element, the process does not properly validate the length of user-supplied data prior to copying it to a buffer. November 20, 2019 Windows Exploits / Client Side
AVEVA InduSoft Web Studio Remote Command Injection Exploit Unauthenticated remote command injection vulnerability in Indusoft Web Studio 8.1 SP2. The vulnerability is exercised via the custom remote agent protocol that is typically found on port 1234 or 51234. An attacker can issue a specially crafted command 66 which causes IWS to load a DB connection file off of a network share using SMB. The DB file can contain OS commands that will be executed at the privilege level used by IWS. November 15, 2019 Windows Exploits / Remote
Microsoft Windows Remote Desktop Protocol BlueKeep Use After Free Exploit Update 2 This update adds support for Windows 7 SP1 x64. November 13, 2019 Windows Exploits / Remote
rConfig ajaxServerSettingsChk and search_crud Remote OS Command Injection Exploit An unauthenticated OS command injection vulnerability in rConfig using the rootUname parameter present in ajaxServerSettingsChk.php allows an attacker to send a request that will attempt to execute OS commands with permissions of the rConfig process on the host system.

Also, an authenticated OS command injection vulnerability using the catCommand parameter present in search.crud.php allows an attackers to do the same as previous, but credentials are required.

November 7, 2019 Linux Exploits / OS Command Injection / Known Vulnerabilities
SolarWinds Dameware Mini Remote Control Unauthenticated RCE Exploit The Solarwinds Dameware Mini Remote Client agent supports smart card authentication by default which allows a user to upload an executable to be executed on the DWRCS.exe host. An unauthenticated, remote attacker can request smart card login and upload and execute an arbitrary executable. November 7, 2019 Windows Exploits / Remote
Apache Solr Velocity Template Remote OS Command Injection Exploit Update A vulnerability in the Apache Solr Velocity template allows unauthenticated attackers to execute arbitrary OS commands.



This update adds automatic core name detection and newer supported versions.
November 6, 2019 Windows, Linux Exploits / OS Command Injection / Known Vulnerabilities
Kibana Timelion Visualizer Remote Javascript OS Command Injection Exploit An arbitrary code execution vulnerability in the Kibana Timelion visualizer allows an attacker with access to the application to send a request that will attempt to execute javascript code with permissions of the Kibana process on the host system. November 4, 2019 Linux Exploits / OS Command Injection / Known Vulnerabilities
Linux Kernel libfutex Privilege Escalation Exploit Update This module has improvements for the Linux Kernel libfutex exploit. November 1, 2019 Linux Exploits / Local
Apache Solr Velocity Template Remote OS Command Injection Exploit A vulnerability in the Apache Solr Velocity template allows unauthenticated attackers to execute arbitrary OS commands. November 1, 2019 Windows, Linux Exploits / OS Command Injection / Known Vulnerabilities
Disk Pulse Enterprise Import Command Local Buffer Overflow Exploit A Buffer Overflow exists when parsing .XML files by Command Import. The vulnerability is caused due to a boundary error when handling a crafted .XML files. October 31, 2019 Windows Exploits / Client Side
Advantech WebAccess SCADA GetUserPasswd BwPAlarm Buffer Overflow Exploit The flaw exists in the GetUserPasswd function in BwPAlarm.dll due to improper validation of user-supplied data before copying the data to a fixed size stack-based buffer when processing an IOCTL 70603 RPC message. October 25, 2019 Windows Exploits / Remote
Sudo Root With User ID Local Privilege Escalation Exploit (CVE-2019-14287) This module exploits a flaw in the way sudo implemented running commands with arbitrary user ID. If a sudoers entry is written to allow the attacker to run a command as any user except root, this flaw can be used by the attacker to bypass that restriction. October 19, 2019 Linux Exploits / Local
FreeBSD IOCTL CDIOCREADSUBCHANNELSYSSPACE Local Privilege Escalation Exploit A bug in the cdrom driver allows users with read access to the cdrom device to arbitrarily overwrite kernel memory when media is present thereby allowing a malicious user in the operator group to gain root privileges. October 18, 2019 FreeBSD Exploits / Local
LibreOffice LibreLogo Python Global Event Scripting Vulnerability Exploit By abusing document's event feature in LibreOffice and the LibreLogo script, an attacker can execute arbitrary python code from within a malicious document silently, without user warning.

This module performs a bypass of CVE-2019-9848 by using global script events.
October 17, 2019 Linux, Windows Exploits / Client Side
Client Side email templates processing improvements This update improves the processing of Client Side email templates. October 8, 2019 Exploits / Remote
Check Point Endpoint Security Initial Client Privilege Escalation Exploit Check Point Endpoint Security includes data security, network security, advanced threat prevention, forensics, and remote access VPN solutions.



Some parts of the software run as a Windows service executed as ''NT AUTHORITY\SYSTEM,'' which provides it with very powerful permissions, this vulnerability can be exploited to achieve privilege escalation, gaining access with NT AUTHORITY\SYSTEM level privileges.
October 2, 2019 Windows Exploits / Local
Microsoft Windows Win32k xxxMNOpenHierarchy Vulnerability Exploit v1 An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. September 26, 2019 Windows Exploits / Local
Fuji Electric Alpha5 Smart Loader Exploit Fuji Electric Alpha5 Smart Loader is prone to a buffer overflow when handling a specially crafted csp file. September 17, 2019 Windows Exploits / Client Side
Microsoft Internet Explorer VBScript UAF Exploit (2019) A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. September 12, 2019 Windows Exploits / Client Side
Adobe ColdFusion JNBridge Remote Code Execution Exploit Adobe ColdFusion is prone to a remote vulnerability that allows attackers to take advantage of an insecure deployment of the JNBridge protocol. September 10, 2019 Windows, Linux Exploits / Remote
Windows Win32k Elevation Of Privilege Exploit (CVE-2019-0803) An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.



To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
September 2, 2019 Windows Exploits / Local
Windows Win32k Elevation Of Privilege Exploit (CVE-2019-0803) 2 An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.



To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
September 2, 2019 Windows Exploits / Local
MAPLE Computer SNMP Administrator Exploit v19_1 Maple Computer SNMP Administrator is prone to a buffer-overflow by sending a specially crafted packet with an overly long string on port 987. August 30, 2019 Windows Exploits / Remote
MAPLE Computer SNMP Administrator Exploit Maple Computer SNMP Administrator is prone to a buffer-overflow by sending a specially crafted packet with an overly long string on port 987. August 30, 2019 Windows Exploits / Remote
LibreOffice LibreLogo Python Scripting Vulnerability Exploit By abusing document's event feature in LibreOffice and the LibreLogo script, an attacker can execute arbitrary python code from within a malicious document silently, without user warning. August 22, 2019 Linux, Windows Exploits / Client Side