Core Certified Exploits
We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.
Subscribe to receive regular updates by email:
Browse All Exploits
|Title||Description||Date Added||CVE Link||Exploit Platform||Exploit Type|
|LibreOffice LibreLogo Python Scripting Vulnerability Exploit v19_1||By abusing document's event feature in LibreOffice and the LibreLogo script, an attacker can execute arbitrary python code from within a malicious document silently, without user warning.||August 22, 2019||CVE-2019-9848||Linux, Windows||Exploits / Client Side|
|Microsoft Windows Remote Desktop Protocol BlueKeep Use After Free Exploit Update||A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Bluekeep'.In this update more supported versions were added.||August 10, 2019||CVE-2019-0708||Windows||Exploits / Remote|
|Microsoft Windows Remote Desktop Protocol BlueKeep Use After Free Exploit||A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Bluekeep'.||August 5, 2019||CVE-2019-0708||Windows||Exploits / Remote|
|LG Device Manager LHA Local Privilege Escalation Exploit||The LHA.sys driver before 1.1.1811.2101 in LG Device Manager exposes functionality that allows low-privileged users to read and write arbitrary physical memory via specially crafted IOCTL requests and elevate system privileges. This occurs because the device object has an associated symbolic link and an open DACL||August 5, 2019||CVE-2019-8372||Windows||Exploits / Local|
|Atlassian Jira Template Injection Vulnerability Remote OS Command Injection Exploit||Server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions.
If an SMTP server has been configured, then an unauthenticated user can execute code on vulnerable systems using the ContactAdministrators action if the "Contact Administrators Form" is enabled; or an authenticated user can execute code on vulnerable systems using the SendBulkMail action if the user has "JIRA Administrators" access.
|August 2, 2019||CVE-2019-11581||Windows, Linux||Exploits / OS Command Injection / Known Vulnerabilities|
|Microsoft Windows LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation||An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.||July 31, 2019||CVE-2019-0836||Windows||Exploits / Local|
|Cisco Data Center Network Manager Arbitrary File Upload Vulnerability Exploit||Cisco Data Center Network Manager is vulnerable to an authenticated arbitrary file upload, which allows to upload a WAR file to the Apache Tomcat webapps directory.
The Apache Tomcat webapps directory can be determined using a information disclosure vulnerability.
Authentication can be bypassed on versions 10.4(2) and below.
|July 26, 2019||CVE-2019-1619||Windows, Linux||Exploits / Remote File Inclusion / Known Vulnerabilities|
|Private Internet Access VPN Malicious OpenSSL Engine Privilege Escalation Exploit||During startup the PIA Windows service(pia-service.exe) loads the OpenSSL library from C:\Program Files\Private Internet Access\libeay32.dll. This library attempts to load the C:\etc\ssl\openssl.cnf configuration file. By default on Windows systems, authenticated users can create directories under C:\. A low privileged user can create a openssl.cnf configuration file to load a malicious OpenSSL engine library resulting in the arbitrary code execution as SYSTEM when the service starts.||July 26, 2019||CVE-2019-12572||Windows||Exploits / Local|
|Microsoft Windows Task Scheduler Elevation of Privilege Vulnerability Exploit||An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system.||July 19, 2019||CVE-2019-1069||Windows||Exploits / Local|
|Atlassian Crowd pdkinstall Plugin Install Vulnerability Exploit||The pdkinstall development plugin is incorrectly enabled in release builds of Atlassian Crowd and Crowd Data Center. An attacker can leverage this vulnerability to install a malicious plugin and execute code in the system.||July 13, 2019||CVE-2019-11580||Windows, Linux||Exploits / Remote File Inclusion / Known Vulnerabilities|
|Microsoft Windows DHCP Server Heap Overflow Vulnerability DoS Update 2||A Heap Overflow vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP server. An attacker who successfully exploited the vulnerability could run arbitrary code on the DHCP server.
This version improves the detection of the effectiveness in non-vulnerable targets.
This update uses Impacket replacing Impacket 2014r1.
|July 1, 2019||CVE-2019-0626||Windows||Denial of Service / Remote|
|Microsoft Windows Remote Desktop Protocol BlueKeep DoS||A Denial of Service exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests.||June 28, 2019||CVE-2019-0708||Windows||Denial of Service / Remote|
|VMware Workstation VMX Process COM Class Hijack Local Privilege Escalation Exploit||VMware Workstation (15.x before 15.0.3, 14.x before 14.1.6) running on Windows does not handle COM classes appropriately. Successful exploitation of this issue may allow hijacking of COM classes used by the VMX process, on a Windows host, leading to elevation of privilege.||June 20, 2019||CVE-2019-5512||Windows||Exploits / Local|
|Oracle Weblogic Server AsyncResponseService Deserialization Vulnerability Remote Code Execution||An unauthenticated attacker can send a malicious SOAP request to the interface WLS AsyncResponseService to execute code on the vulnerable host.
The attacker must have network access to the Oracle Weblogic Server T3 interface.
|June 17, 2019||CVE-2019-2725||Windows, Linux||Exploits / OS Command Injection / Known Vulnerabilities|
|Windows AppX Deployment Service AppXSVC Privilege Escalation Exploit||An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'.||June 10, 2019||CVE-2019-0841||Windows||Exploits / Local|
|Cisco Prime Infrastructure Health Monitor UploadServlet Remote JSP File Upload Vulnerability Exploit||The TarArchive class blindly extracts tar archives without checking for directory traversals. An attacker can leverage this vulnerability to execute code in the system.||June 6, 2019||CVE-2019-1821||Linux||Exploits / Remote File Inclusion / Known Vulnerabilities|
|Microsoft Windows Remote Desktop Protocol BlueKeep Detector||An unauthenticated attacker can connect to the target system using RDP and sends specially crafted requests to exploit the vulnerability.
This module tries to verify if the vulnerability is present, without deploying an agent.
|June 6, 2019||CVE-2019-0708||Windows||Exploits / Remote|
|Microsoft Windows LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Vulnerability Exploit||An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.||June 5, 2019||CVE-2019-0730||Windows||Exploits / Local|
|Panda Antivirus AgentSvc Local Privilege Escalation Exploit||The vulnerable is a Local Privilege Escalation in AgentSvc.exe. This service creates a global section object and a corresponding global event that is signaled whenever a process that writes to the shared memory wants the data to be processed by the service. The vulnerability lies in the weak permissions that are affected to both these objects allowing "Everyone" including unprivileged users to manipulate the shared memory and the event.||May 31, 2019||CVE-2019-12042||Windows||Exploits / Local|
|XMPlay M3U Files Buffer Overflow Exploit||XMPlay 3.8.3 allows remote attackers to execute arbitrary code via a crafted http:// URL in a .m3u file.||May 29, 2019||CVE-2018-19357||Windows||Exploits / Client Side|
|License_powersploit_script||License for Invoke-ReflectivePEInjection.ps1 from PowerSploit framework is added||May 24, 2019||https://cve.mitre.org/cgi-bin/cvename.cgi?name=||Exploits / Remote|
|Microsoft Windows DHCP Client Integer Underflow DoS||The specific flaw exists within the DHCP Client service. A crafted DHCP packet can trigger an integer underflow before writing to memory.||May 21, 2019||CVE-2019-0726||Windows||Denial of Service / Remote|
|Sophos SafeGuard Enterprise Arbitrary Write SGStDrvm Local Privilege Escalation Exploit Update||Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via multiple IOCTLs. This update fixes an error in the injection.||May 17, 2019||CVE-2018-6854||Windows||Exploits / Local|
|Atlassian Confluence Widget Connector Macro Vulnerability Exploit Update||The Widget Connector macro in Atlassian Confluence Server allows remote attackers to achieve path traversal and remote code execution via server-side template injection.
This update adds support to control the FTP Server port number and socket timeout.
|May 14, 2019||CVE-2019-3396||Windows, Linux||Exploits / OS Command Injection / Known Vulnerabilities|
|Dnsmasq Heap buffer Overflow DoS||Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.||May 10, 2019||CVE-2017-14491||Linux||Denial of Service / Remote|