Core Certified Exploits
We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.
Subscribe to receive regular updates by email:
Browse All Exploits
|Title||Description||Date Added||CVE Link||Exploit Platform||Exploit Type|
|Windows Error Reporting Manager Arbitrary File Move Elevation of Privilege Exploit (CVE-2019-1315)||An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles hard links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
|January 31, 2020||CVE-2019-1315||Windows||Exploits / Local|
|MSI Afterburner RTCore64 Privilege Escalation Exploit||The driver in Micro-Star MSI Afterburner 22.214.171.12458 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs.||January 27, 2020||CVE-2019-16098||Windows||Exploits / Local|
|Cisco Data Center Network Manager HostEnclHandler getVmHostData SQL Injection Vulnerability Exploit||This module uses an authentication bypass and a SQL injection vulnerability in order to upload and execute a JSP file in the Wildfly virtual file system webapps directory.||January 22, 2020||CVE-2019-15976||Windows, Linux||Exploits / Authentication Weakness / Known Vulnerabilities|
|Citrix ADC and Gateway Directory Traversal Vulnerability Exploit||Citrix Application Delivery Controller (ADC) and Citrix Gateway are prone to a directory traversal vulnerability that allows attackers to upload an XML file via newbm.pl and execute system commands.||January 14, 2020||CVE-2019-19781||FreeBSD||Exploits / Remote|
|Microsoft Windows Win32k xxxMNFindWindowFromPoint Vulnerability Exploit||An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.||January 10, 2020||CVE-2019-0808||Windows||Exploits / Local|
|Linux PTRACE_TRACEME Local Privilege Escalation Exploit||In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker).||January 6, 2020||CVE-2019-13272||Linux||Exploits / Local|
|Microsoft Windows UPnP Device Host Local Privilege Escalation Exploit||This module exploits two vulnerabilities (CVE-2019-1405 & CVE-2019-1322) in order to get SYSTEM privileges. The first one "UPnP Device Host" allows us to get SERVICE privileges. The second one "Update Orchestrator Service" allows us to escalate from SERVICE to SYSTEM.||December 30, 2019||CVE-2019-1405||Windows||Exploits / Local|
|File Sharing Wizard POST Method Exploit||File Sharing Wizard is prone to a buffer-overflow when handling a specially crafted HTTP POST parameter.||December 27, 2019||CVE-2019-16724||Windows||Exploits / Remote|
|Viper RGB Driver Kernel Arbitrary Read Write Local Privilege Escalation Exploit||The MsIo64.sys and MsIo32.sys drivers in Patriot Viper RGB allow local users (including low integrity processes) to read and write to arbitrary memory locations, and consequently gain NT AUTHORITY\SYSTEM privileges, by mapping \Device\PhysicalMemory into the calling process via ZwOpenSection and ZwMapViewOfSection.||December 18, 2019||CVE-2019-18845||Windows||Exploits / Local|
|Microsoft Windows Remote Desktop Protocol BlueKeep DoS Update||A Denial of Service exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests.
This update corrects wrong category specification.
|December 17, 2019||CVE-2019-0708||Windows||Denial of Service / Remote|
|Robot Attack Vulnerability Analyzer||This module will send various malformed messages over ssl to the target service in order to detect a discrepancy between the server's responses, if this is the case, it will mark said target as vulnerable to this kind of attacks (ROBOT attack)||December 4, 2019||NOCVE-9999-127128||Linux||Information gathering / Vulnerability checkers|
|Microsoft Internet Explorer Scripting Engine Memory Corruption Exploit||A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system.||December 3, 2019||CVE-2019-0752||Windows||Exploits / Client Side|
|Apache Solr ENABLE_REMOTE_JMX_OPTS JMX-RMI Remote Code Execution Exploit||Apache Solr is prone to a remote vulnerability that allows attackers to take advantage of an insecure deployment of the JMX/RMI service used to manage and monitor the Java Virtual Machine.
By exploiting known methods, it is possible to remotely load an MLet file from an attacker controlled web server that points at a jar file.
|November 27, 2019||CVE-2019-12409||Linux||Exploits / Remote|
|WECON LeviStudioU SMtext Buffer Overflow Exploit||The specific flaw exists within the handling of XML files. When parsing the ShortMessage SMtext element, the process does not properly validate the length of user-supplied data prior to copying it to a buffer.||November 20, 2019||NOCVE-9999-127119||Windows||Exploits / Client Side|
|AVEVA InduSoft Web Studio Remote Command Injection Exploit||Unauthenticated remote command injection vulnerability in Indusoft Web Studio 8.1 SP2. The vulnerability is exercised via the custom remote agent protocol that is typically found on port 1234 or 51234. An attacker can issue a specially crafted command 66 which causes IWS to load a DB connection file off of a network share using SMB. The DB file can contain OS commands that will be executed at the privilege level used by IWS.||November 15, 2019||CVE-2019-6545||Windows||Exploits / Remote|
|Microsoft Windows Remote Desktop Protocol BlueKeep Use After Free Exploit Update 2||This update adds support for Windows 7 SP1 x64.||November 13, 2019||CVE-2019-0708||Windows||Exploits / Remote|
|SolarWinds Dameware Mini Remote Control Unauthenticated RCE Exploit||The Solarwinds Dameware Mini Remote Client agent supports smart card authentication by default which allows a user to upload an executable to be executed on the DWRCS.exe host. An unauthenticated, remote attacker can request smart card login and upload and execute an arbitrary executable.||November 7, 2019||CVE-2019-3980||Windows||Exploits / Remote|
|rConfig ajaxServerSettingsChk and search_crud Remote OS Command Injection Exploit||An unauthenticated OS command injection vulnerability in rConfig using the rootUname parameter present in ajaxServerSettingsChk.php allows an attacker to send a request that will attempt to execute OS commands with permissions of the rConfig process on the host system.
Also, an authenticated OS command injection vulnerability using the catCommand parameter present in search.crud.php allows an attackers to do the same as previous, but credentials are required.
|November 7, 2019||CVE-2019-16662||Linux||Exploits / OS Command Injection / Known Vulnerabilities|
|Apache Solr Velocity Template Remote OS Command Injection Exploit Update||A vulnerability in the Apache Solr Velocity template allows unauthenticated attackers to execute arbitrary OS commands.
This update adds automatic core name detection and newer supported versions.
|November 6, 2019||NOCVE-9999-127120||Windows, Linux||Exploits / OS Command Injection / Known Vulnerabilities|
|Linux Kernel libfutex Privilege Escalation Exploit Update||This module has improvements for the Linux Kernel libfutex exploit.||November 1, 2019||CVE-2014-3153||Linux||Exploits / Local|
|Apache Solr Velocity Template Remote OS Command Injection Exploit||A vulnerability in the Apache Solr Velocity template allows unauthenticated attackers to execute arbitrary OS commands.||November 1, 2019||NOCVE-9999-127120||Windows, Linux||Exploits / OS Command Injection / Known Vulnerabilities|
|Disk Pulse Enterprise Import Command Local Buffer Overflow Exploit||A Buffer Overflow exists when parsing .XML files by Command Import. The vulnerability is caused due to a boundary error when handling a crafted .XML files.||October 31, 2019||CVE-2017-7310||Windows||Exploits / Client Side|
|Advantech WebAccess SCADA GetUserPasswd BwPAlarm Buffer Overflow Exploit||The flaw exists in the GetUserPasswd function in BwPAlarm.dll due to improper validation of user-supplied data before copying the data to a fixed size stack-based buffer when processing an IOCTL 70603 RPC message.||October 25, 2019||CVE-2018-18999||Windows||Exploits / Remote|
|Sudo Root With User ID Local Privilege Escalation Exploit (CVE-2019-14287)||This module exploits a flaw in the way sudo implemented running commands with arbitrary user ID. If a sudoers entry is written to allow the attacker to run a command as any user except root, this flaw can be used by the attacker to bypass that restriction.||October 19, 2019||CVE-2019-14287||Linux||Exploits / Local|