Core Certified Exploits
We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.
Subscribe to receive regular updates by email:
Browse All Exploits
|Title||Description||Date Added||CVE Link||Exploit Platform||Exploit Type|
|VMware Workstation VMX Process COM Class Hijack Local Privilege Escalation Exploit||VMware Workstation (15.x before 15.0.3, 14.x before 14.1.6) running on Windows does not handle COM classes appropriately. Successful exploitation of this issue may allow hijacking of COM classes used by the VMX process, on a Windows host, leading to elevation of privilege.||June 20, 2019||CVE-2019-5512||Windows||Exploits / Local|
|Oracle Weblogic Server AsyncResponseService Deserialization Vulnerability Remote Code Execution||An unauthenticated attacker can send a malicious SOAP request to the interface WLS AsyncResponseService to execute code on the vulnerable host.
The attacker must have network access to the Oracle Weblogic Server T3 interface.
|June 17, 2019||CVE-2019-2725||Windows, Linux||Exploits / OS Command Injection / Known Vulnerabilities|
|Windows AppX Deployment Service AppXSVC Privilege Escalation Exploit||An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'.||June 10, 2019||CVE-2019-0841||Windows||Exploits / Local|
|Cisco Prime Infrastructure Health Monitor UploadServlet Remote JSP File Upload Vulnerability Exploit||The TarArchive class blindly extracts tar archives without checking for directory traversals. An attacker can leverage this vulnerability to execute code in the system.||June 6, 2019||CVE-2019-1821||Linux||Exploits / Remote File Inclusion / Known Vulnerabilities|
|Microsoft Windows Remote Desktop Protocol BlueKeep Detector||An unauthenticated attacker can connect to the target system using RDP and sends specially crafted requests to exploit the vulnerability.
This module tries to verify if the vulnerability is present, without deploying an agent.
|June 6, 2019||CVE-2019-0708||Windows||Exploits / Remote|
|Microsoft Windows LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Vulnerability Exploit||An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.||June 5, 2019||CVE-2019-0730||Windows||Exploits / Local|
|Panda Antivirus AgentSvc Local Privilege Escalation Exploit||The vulnerable is a Local Privilege Escalation in AgentSvc.exe. This service creates a global section object and a corresponding global event that is signaled whenever a process that writes to the shared memory wants the data to be processed by the service. The vulnerability lies in the weak permissions that are affected to both these objects allowing "Everyone" including unprivileged users to manipulate the shared memory and the event.||May 31, 2019||CVE-2019-12042||Windows||Exploits / Local|
|XMPlay M3U Files Buffer Overflow Exploit||XMPlay 3.8.3 allows remote attackers to execute arbitrary code via a crafted http:// URL in a .m3u file.||May 29, 2019||CVE-2018-19357||Windows||Exploits / Client Side|
|License_powersploit_script||License for Invoke-ReflectivePEInjection.ps1 from PowerSploit framework is added||May 24, 2019||https://cve.mitre.org/cgi-bin/cvename.cgi?name=||Exploits / Remote|
|Microsoft Windows DHCP Client Integer Underflow DoS||The specific flaw exists within the DHCP Client service. A crafted DHCP packet can trigger an integer underflow before writing to memory.||May 21, 2019||CVE-2019-0726||Windows||Denial of Service / Remote|
|Sophos SafeGuard Enterprise Arbitrary Write SGStDrvm Local Privilege Escalation Exploit Update||Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via multiple IOCTLs. This update fixes an error in the injection.||May 17, 2019||CVE-2018-6854||Windows||Exploits / Local|
|Atlassian Confluence Widget Connector Macro Vulnerability Exploit Update||The Widget Connector macro in Atlassian Confluence Server allows remote attackers to achieve path traversal and remote code execution via server-side template injection.
This update adds support to control the FTP Server port number and socket timeout.
|May 14, 2019||CVE-2019-3396||Windows, Linux||Exploits / OS Command Injection / Known Vulnerabilities|
|Dnsmasq Heap buffer Overflow DoS||Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.||May 10, 2019||CVE-2017-14491||Linux||Denial of Service / Remote|
|Microsoft Windows Win32k DestroyClass Vulnerability Exploit Update||This update adds support for Windows 7 64-bit.||May 10, 2019||CVE-2019-0623||Windows||Exploits / Local|
|Atlassian Confluence Widget Connector Macro Vulnerability Exploit||The Widget Connector macro in Atlassian Confluence Server allows remote attackers to achieve path traversal and remote code execution via server-side template injection.||May 7, 2019||CVE-2019-3396||Windows, Linux||Exploits / OS Command Injection / Known Vulnerabilities|
|Dnsmasq Integer Underflow DoS||In dnsmasq before 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero's (0xffffffffffffffff in 64 bit platforms), making dnsmasq crash.||May 4, 2019||CVE-2017-13704||Linux||Denial of Service / Remote|
|Microsoft Windows Win32k DestroyClass Vulnerability Exploit||An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.||April 26, 2019||CVE-2019-0623||Windows||Exploits / Local|
|Microsoft Windows DCOM-RPC NTLM Reflection Elevation of Privilege Exploit Update||This update improves the reliability by handling scenarios where the attack cannot be performed.||April 17, 2019||CVE-2016-3225||Windows||Exploits / Local|
|Microsoft Windows Shell Remote Code Execution Vulnerability Exploit (CVE-2018-8495)||Microsoft Windows Shell does not properly sanitize special characters in a URI, allowing the opening a dangerous files.
An attacker can leverage this vulnerability to execute code in the context of the current user.
|April 15, 2019||CVE-2018-8495||Windows||Exploits / Client Side|
|Apache Tika Server OS Command Injection Exploit||An OS Command Injection Vulnerability was found in Apache Tika Server 1.11||April 12, 2019||CVE-2018-1335||Windows||Exploits / Remote Code Execution|
|Foxit Reader UAF Remote Execution Exploit||A Buffer Overflow exists when parsing .PDF files. The vulnerability is caused due to a boundary error when handling a crafted .PDF files.||April 11, 2019||CVE-2018-9948||Windows||Exploits / Client Side|
|Free MP3 CD Ripper Buffer Overflow SEH Exploit Update||A Buffer Overflow exists when parsing .mp3/wma files. The vulnerability is caused due to a boundary error when handling a crafted .mp3/wma files.||April 10, 2019||CVE-2019-9767||Windows||Exploits / Client Side|
|Microsoft Windows Win32k UaF xxxDestroyWindow Local Privilege Escalation Exploit||An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
|April 5, 2019||CVE-2018-8453||Windows||Exploits / Local|
|Microsoft Windows DHCP Server Heap Overflow Vulnerability DoS Update||A Heap Overflow vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP server. An attacker who successfully exploited the vulnerability could run arbitrary code on the DHCP server.
This version improves the detection of the effectiveness in non-vulnerable targets.
|April 2, 2019||CVE-2019-0626||Windows||Denial of Service / Remote|
|MS17-010 exploit updates||This update adds support for new platforms to the MS17-010 exploitation such as Windows 7 Embedded Standard edition, and also 32 bits targets.||March 29, 2019||CVE-2017-0143||Windows||Exploits / Remote|