Core Certified Exploits

We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Subscribe to receive regular updates by email:

 

Browse All Exploits

 

 

Title Description Date Added CVE Link Exploit Platform Exploit Type
LibreOffice LibreLogo Python Scripting Vulnerability Exploit v19_1 By abusing document's event feature in LibreOffice and the LibreLogo script, an attacker can execute arbitrary python code from within a malicious document silently, without user warning. August 22, 2019 Linux, Windows Exploits / Client Side
Microsoft Windows Remote Desktop Protocol BlueKeep Use After Free Exploit Update A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Bluekeep'.In this update more supported versions were added. August 10, 2019 Windows Exploits / Remote
Microsoft Windows Remote Desktop Protocol BlueKeep Use After Free Exploit A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Bluekeep'. August 5, 2019 Windows Exploits / Remote
LG Device Manager LHA Local Privilege Escalation Exploit The LHA.sys driver before 1.1.1811.2101 in LG Device Manager exposes functionality that allows low-privileged users to read and write arbitrary physical memory via specially crafted IOCTL requests and elevate system privileges. This occurs because the device object has an associated symbolic link and an open DACL August 5, 2019 Windows Exploits / Local
Atlassian Jira Template Injection Vulnerability Remote OS Command Injection Exploit Server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions.



If an SMTP server has been configured, then an unauthenticated user can execute code on vulnerable systems using the ContactAdministrators action if the "Contact Administrators Form" is enabled; or an authenticated user can execute code on vulnerable systems using the SendBulkMail action if the user has "JIRA Administrators" access.
August 2, 2019 Windows, Linux Exploits / OS Command Injection / Known Vulnerabilities
Microsoft Windows LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. July 31, 2019 Windows Exploits / Local
Cisco Data Center Network Manager Arbitrary File Upload Vulnerability Exploit Cisco Data Center Network Manager is vulnerable to an authenticated arbitrary file upload, which allows to upload a WAR file to the Apache Tomcat webapps directory.



The Apache Tomcat webapps directory can be determined using a information disclosure vulnerability.



Authentication can be bypassed on versions 10.4(2) and below.
July 26, 2019 Windows, Linux Exploits / Remote File Inclusion / Known Vulnerabilities
Private Internet Access VPN Malicious OpenSSL Engine Privilege Escalation Exploit During startup the PIA Windows service(pia-service.exe) loads the OpenSSL library from C:\Program Files\Private Internet Access\libeay32.dll. This library attempts to load the C:\etc\ssl\openssl.cnf configuration file. By default on Windows systems, authenticated users can create directories under C:\. A low privileged user can create a openssl.cnf configuration file to load a malicious OpenSSL engine library resulting in the arbitrary code execution as SYSTEM when the service starts. July 26, 2019 Windows Exploits / Local
Microsoft Windows Task Scheduler Elevation of Privilege Vulnerability Exploit An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. July 19, 2019 Windows Exploits / Local
Atlassian Crowd pdkinstall Plugin Install Vulnerability Exploit The pdkinstall development plugin is incorrectly enabled in release builds of Atlassian Crowd and Crowd Data Center. An attacker can leverage this vulnerability to install a malicious plugin and execute code in the system. July 13, 2019 Windows, Linux Exploits / Remote File Inclusion / Known Vulnerabilities
Microsoft Windows DHCP Server Heap Overflow Vulnerability DoS Update 2 A Heap Overflow vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP server. An attacker who successfully exploited the vulnerability could run arbitrary code on the DHCP server.

This version improves the detection of the effectiveness in non-vulnerable targets.

This update uses Impacket replacing Impacket 2014r1.
July 1, 2019 Windows Denial of Service / Remote
Microsoft Windows Remote Desktop Protocol BlueKeep DoS A Denial of Service exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. June 28, 2019 Windows Denial of Service / Remote
VMware Workstation VMX Process COM Class Hijack Local Privilege Escalation Exploit VMware Workstation (15.x before 15.0.3, 14.x before 14.1.6) running on Windows does not handle COM classes appropriately. Successful exploitation of this issue may allow hijacking of COM classes used by the VMX process, on a Windows host, leading to elevation of privilege. June 20, 2019 Windows Exploits / Local
Oracle Weblogic Server AsyncResponseService Deserialization Vulnerability Remote Code Execution An unauthenticated attacker can send a malicious SOAP request to the interface WLS AsyncResponseService to execute code on the vulnerable host.

The attacker must have network access to the Oracle Weblogic Server T3 interface.
June 17, 2019 Windows, Linux Exploits / OS Command Injection / Known Vulnerabilities
Windows AppX Deployment Service AppXSVC Privilege Escalation Exploit An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. June 10, 2019 Windows Exploits / Local
Cisco Prime Infrastructure Health Monitor UploadServlet Remote JSP File Upload Vulnerability Exploit The TarArchive class blindly extracts tar archives without checking for directory traversals. An attacker can leverage this vulnerability to execute code in the system. June 6, 2019 Linux Exploits / Remote File Inclusion / Known Vulnerabilities
Microsoft Windows Remote Desktop Protocol BlueKeep Detector An unauthenticated attacker can connect to the target system using RDP and sends specially crafted requests to exploit the vulnerability.

This module tries to verify if the vulnerability is present, without deploying an agent.
June 6, 2019 Windows Exploits / Remote
Microsoft Windows LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Vulnerability Exploit An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. June 5, 2019 Windows Exploits / Local
Panda Antivirus AgentSvc Local Privilege Escalation Exploit The vulnerable is a Local Privilege Escalation in AgentSvc.exe. This service creates a global section object and a corresponding global event that is signaled whenever a process that writes to the shared memory wants the data to be processed by the service. The vulnerability lies in the weak permissions that are affected to both these objects allowing "Everyone" including unprivileged users to manipulate the shared memory and the event. May 31, 2019 Windows Exploits / Local
XMPlay M3U Files Buffer Overflow Exploit XMPlay 3.8.3 allows remote attackers to execute arbitrary code via a crafted http:// URL in a .m3u file. May 29, 2019 Windows Exploits / Client Side
License_powersploit_script License for Invoke-ReflectivePEInjection.ps1 from PowerSploit framework is added May 24, 2019 Exploits / Remote
Microsoft Windows DHCP Client Integer Underflow DoS The specific flaw exists within the DHCP Client service. A crafted DHCP packet can trigger an integer underflow before writing to memory. May 21, 2019 Windows Denial of Service / Remote
Sophos SafeGuard Enterprise Arbitrary Write SGStDrvm Local Privilege Escalation Exploit Update Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via multiple IOCTLs. This update fixes an error in the injection. May 17, 2019 Windows Exploits / Local
Atlassian Confluence Widget Connector Macro Vulnerability Exploit Update The Widget Connector macro in Atlassian Confluence Server allows remote attackers to achieve path traversal and remote code execution via server-side template injection.



This update adds support to control the FTP Server port number and socket timeout.
May 14, 2019 Windows, Linux Exploits / OS Command Injection / Known Vulnerabilities
Dnsmasq Heap buffer Overflow DoS Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response. May 10, 2019 Linux Denial of Service / Remote