Core Certified Exploits

We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Subscribe to receive regular updates by email:

 

Browse All Exploits

 

 

Title Description Date Added CVE Link Exploit Platform Exploit Type
FreeBSD IOCTL CDIOCREADSUBCHANNELSYSSPACE Local Privilege Escalation Exploit A bug in the cdrom driver allows users with read access to the cdrom device to arbitrarily overwrite kernel memory when media is present thereby allowing a malicious user in the operator group to gain root privileges. October 18, 2019 FreeBSD Exploits / Local
LibreOffice LibreLogo Python Global Event Scripting Vulnerability Exploit By abusing document's event feature in LibreOffice and the LibreLogo script, an attacker can execute arbitrary python code from within a malicious document silently, without user warning.

This module performs a bypass of CVE-2019-9848 by using global script events.
October 17, 2019 Linux, Windows Exploits / Client Side
Client Side email templates processing improvements This update improves the processing of Client Side email templates. October 8, 2019 Exploits / Remote
Check Point Endpoint Security Initial Client Privilege Escalation Exploit Check Point Endpoint Security includes data security, network security, advanced threat prevention, forensics, and remote access VPN solutions.



Some parts of the software run as a Windows service executed as ''NT AUTHORITY\SYSTEM,'' which provides it with very powerful permissions, this vulnerability can be exploited to achieve privilege escalation, gaining access with NT AUTHORITY\SYSTEM level privileges.
October 2, 2019 Windows Exploits / Local
Microsoft Windows Win32k xxxMNOpenHierarchy Vulnerability Exploit v1 An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. September 26, 2019 Windows Exploits / Local
Fuji Electric Alpha5 Smart Loader Exploit Fuji Electric Alpha5 Smart Loader is prone to a buffer overflow when handling a specially crafted csp file. September 17, 2019 Windows Exploits / Client Side
Microsoft Internet Explorer VBScript UAF Exploit (2019) A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. September 12, 2019 Windows Exploits / Client Side
Adobe ColdFusion JNBridge Remote Code Execution Exploit Adobe ColdFusion is prone to a remote vulnerability that allows attackers to take advantage of an insecure deployment of the JNBridge protocol. September 10, 2019 Windows, Linux Exploits / Remote
Windows Win32k Elevation Of Privilege Exploit (CVE-2019-0803) An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.



To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
September 2, 2019 Windows Exploits / Local
Windows Win32k Elevation Of Privilege Exploit (CVE-2019-0803) 2 An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.



To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
September 2, 2019 Windows Exploits / Local
MAPLE Computer SNMP Administrator Exploit v19_1 Maple Computer SNMP Administrator is prone to a buffer-overflow by sending a specially crafted packet with an overly long string on port 987. August 30, 2019 Windows Exploits / Remote
MAPLE Computer SNMP Administrator Exploit Maple Computer SNMP Administrator is prone to a buffer-overflow by sending a specially crafted packet with an overly long string on port 987. August 30, 2019 Windows Exploits / Remote
LibreOffice LibreLogo Python Scripting Vulnerability Exploit v19_1 By abusing document's event feature in LibreOffice and the LibreLogo script, an attacker can execute arbitrary python code from within a malicious document silently, without user warning. August 22, 2019 Linux, Windows Exploits / Client Side
LibreOffice LibreLogo Python Scripting Vulnerability Exploit By abusing document's event feature in LibreOffice and the LibreLogo script, an attacker can execute arbitrary python code from within a malicious document silently, without user warning. August 22, 2019 Linux, Windows Exploits / Client Side
Microsoft Windows Remote Desktop Protocol BlueKeep Use After Free Exploit Update A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Bluekeep'.In this update more supported versions were added. August 10, 2019 Windows Exploits / Remote
LG Device Manager LHA Local Privilege Escalation Exploit The LHA.sys driver before 1.1.1811.2101 in LG Device Manager exposes functionality that allows low-privileged users to read and write arbitrary physical memory via specially crafted IOCTL requests and elevate system privileges. This occurs because the device object has an associated symbolic link and an open DACL August 5, 2019 Windows Exploits / Local
Microsoft Windows Remote Desktop Protocol BlueKeep Use After Free Exploit A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Bluekeep'. August 5, 2019 Windows Exploits / Remote
Atlassian Jira Template Injection Vulnerability Remote OS Command Injection Exploit Server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions.



If an SMTP server has been configured, then an unauthenticated user can execute code on vulnerable systems using the ContactAdministrators action if the "Contact Administrators Form" is enabled; or an authenticated user can execute code on vulnerable systems using the SendBulkMail action if the user has "JIRA Administrators" access.
August 2, 2019 Windows, Linux Exploits / OS Command Injection / Known Vulnerabilities
Microsoft Windows LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. July 31, 2019 Windows Exploits / Local
Cisco Data Center Network Manager Arbitrary File Upload Vulnerability Exploit Cisco Data Center Network Manager is vulnerable to an authenticated arbitrary file upload, which allows to upload a WAR file to the Apache Tomcat webapps directory.



The Apache Tomcat webapps directory can be determined using a information disclosure vulnerability.



Authentication can be bypassed on versions 10.4(2) and below.
July 26, 2019 Windows, Linux Exploits / Remote File Inclusion / Known Vulnerabilities
Private Internet Access VPN Malicious OpenSSL Engine Privilege Escalation Exploit During startup the PIA Windows service(pia-service.exe) loads the OpenSSL library from C:\Program Files\Private Internet Access\libeay32.dll. This library attempts to load the C:\etc\ssl\openssl.cnf configuration file. By default on Windows systems, authenticated users can create directories under C:\. A low privileged user can create a openssl.cnf configuration file to load a malicious OpenSSL engine library resulting in the arbitrary code execution as SYSTEM when the service starts. July 26, 2019 Windows Exploits / Local
Microsoft Windows Task Scheduler Elevation of Privilege Vulnerability Exploit An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. July 19, 2019 Windows Exploits / Local
Atlassian Crowd pdkinstall Plugin Install Vulnerability Exploit The pdkinstall development plugin is incorrectly enabled in release builds of Atlassian Crowd and Crowd Data Center. An attacker can leverage this vulnerability to install a malicious plugin and execute code in the system. July 13, 2019 Windows, Linux Exploits / Remote File Inclusion / Known Vulnerabilities
Microsoft Windows DHCP Server Heap Overflow Vulnerability DoS Update 2 A Heap Overflow vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP server. An attacker who successfully exploited the vulnerability could run arbitrary code on the DHCP server.

This version improves the detection of the effectiveness in non-vulnerable targets.

This update uses Impacket replacing Impacket 2014r1.
July 1, 2019 Windows Denial of Service / Remote
Microsoft Windows Remote Desktop Protocol BlueKeep DoS A Denial of Service exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. June 28, 2019 Windows Denial of Service / Remote