Core Certified Exploits

Library of expert validated exploits for safe and effective pen tests

Browse the Core Certified Exploit Library  

 

Exploit development can be an advanced penetration testing skill that takes time to master. Additionally, when on a job, pen testers often don’t have the resources to create a new exploit. Many resort to searching for and using pre-written exploits that have not been tested and must go through the timely effort of quality assurance testing in order to ensure they are secure and effective.

Core Impact users can save time by finding all the up-to-date exploits they need in one place. We provide a robust library of exploits designed to enable pen testers to safely and efficiently conduct successful penetration tests. Witten by our own internal team, you can trust they have been thoroughly tested and validated by our experts.

The universe of vulnerabilities is huge and not all of them represent the same risk for the customers. Vulnerabilities do not all have the same level of criticality. Some may be easily exploitable by a low-level user, while others may not be exploitable at all. To increase the efficiency of the attacks and the quality of the exploits provided, the Core Impact team has developed selection criteria to prioritize its analysis and implementation. We determine which exploits warrant creation based on the following questions:

  • What are the most critical attacks from the attacker’s perspective?
  • What new vulnerabilities are more likely to be exploited in real attacks?
  • What exploits are the most valuable for Core Impact?

Once an exploit is approved, its priority order considers the following variables: 

  • Vulnerability Properties: CVE, disclosure date, access mechanism and privileges needed.
  • Target Environment Setup: OS, application prevalence, version and special configurations needed.
  • Value Provided to Core Impact: Customer request, usage in multiple attacks, allows the installation of an agent, etc.
  • Technical Cost vs. Benefit: An analysis weighing the resources needed to build an exploit with the internal and external knowledge gained in its creation. 

Each one of these variables has a different weight and provides a ranking of the potential exploits to be developed. Following those criteria, the top of the list would contain, for example, a vulnerability on Windows (most popular OS) that can be exploited remotely, without authentication and that provides super user privileges. 

Correspondingly, a vulnerability on an application that is rarely installed, needs special configurations, and requires User Interaction, would be at the bottom.

Stay Informed of New Core Certified Exploits

Subscribe to receive regular email updates on new exploits available for Core Impact

Browse the Core Certified Exploit Library

We provide pen testers with real-time updates for a wide range of exploits for different platforms, operating systems, and applications. 

Search our continuously growing library to discover an exploit that will allow you to gain and retain access on the target host or application.

Title Description Date Added CVE Link Exploit Platform Exploit Type Product Name
Microsoft Streaming Service Elevation of Privilege Vulnerability Exploit The mskssrv.sys driver before 10.0.22621.1 exposes functionality that allows low-privileged users to read and write arbitrary memory via specially crafted IOCTL requests and elevate system privileges. Windows Exploits / Local / Privilege Escalation Impact
ArcServe UDP Agent flash-webui Authentication Bypass Exploit Arcserve UDP Agent from version 7.0 to 9.0 allows authentication bypass. The method getVersionInfo in WebServiceImpl/services/FlashServiceImpl exposes the AuthUUID token. This token can be used at /WebServiceImpl/services/VirtualStandbyServiceImpl to obtain a valid session. It is also possible to obtain administrator credentials. Also, the credentials of the ArcServe UDP Agent are added as an identity. This module tries to determine remotely, if the target host is either vulnerable to CVE-2023-26258 or not. Windows Exploits / Remote Impact
Jetbrains TeamCity RPC2 Authentication Bypass Vulnerability Remote Code Execution Exploit This module exploits an OS Command Injection to deploy an agent in Jetbrains TeamCity. The vulnerability is in the requestPreHandlingAllowed function, which doesn't enforce authentication in HTTP requests with a path that ends with /RPC2. Linux, Windows Exploits / OS Command Injection / Known Vulnerabilities Impact
Jetbrains TeamCity RPC2 Authentication Bypass Vulnerability Remote Code Execution Webapp Exploit This module exploits an OS Command Injection to deploy an agent in Jetbrains TeamCity. The vulnerability is in the requestPreHandlingAllowed function, which doesn't enforce authentication in HTTP requests with a path that ends with /RPC2. Linux, Windows Exploits / OS Command Injection / Known Vulnerabilities Impact
Progress WS_FTP Server DeserializeProcessor NET Deserialization Vulnerability Remote Code Execution Exploit This module exploits a .NET deserialization vulnerability in the Ad hoc Transfer Module of Progress WS_FTP Server. The vulnerability is in the DeserializeProcessor function of the MyFileUpload.UploadManager class. Windows Exploits / OS Command Injection / Known Vulnerabilities Impact
Progress WS_FTP Server DeserializeProcessor NET Deserialization Vulnerability Remote Code Execution Webapp Exploit This module exploits a .NET deserialization vulnerability in the Ad hoc Transfer Module of Progress WS_FTP Server. The vulnerability is in the DeserializeProcessor function of the MyFileUpload.UploadManager class. Windows Exploits / OS Command Injection / Known Vulnerabilities Impact
Windows File History Service FHSVC Elevation of Privilege Exploit The vulnerability exists due to application does not properly impose security restrictions in Windows File History Service, which leads to security restrictions bypass and privilege escalation and allows a local user to escalate privileges to NT AUTHORITY\SYSTEM. Windows Exploits / Local / Privilege Escalation Impact
VMWare Aria Operations for Networks evictPublishedSupportBundles Remote OS Command Injection Exploit This module exploits an OS Command Injection to deploy an agent in VMWare Aria Operations for Networks (aka vRealize Network Insight). The vulnerability is in the evictPublishedSupportBundles function of ScriptUtils class. The deployed agent will run with root user privileges. Linux Exploits / OS Command Injection / Known Vulnerabilities Impact
VMWare Aria Operations for Networks evictPublishedSupportBundles Remote OS Command Injection Webapp Exploit This module exploits an OS Command Injection to deploy an agent in VMWare Aria Operations for Networks (aka vRealize Network Insight). The vulnerability is in the evictPublishedSupportBundles function of ScriptUtils class. The deployed agent will run with root user privileges. Linux Exploits / OS Command Injection / Known Vulnerabilities Impact
Ivanti Avalanche WLAvalancheService Unauthenticated Remote Buffer Overflow Exploit This vulnerability allows remote attackers to execute arbitrary code on installations of Ivanti Avalanche, which can be exploited by malicious people to compromise a vulnerable system. Ivanti Avalanche is prone to a buffer-overflow vulnerability when handling a large amount of data, this can trigger an overflow in a finite-sized internal memory buffer. Windows Exploits / Remote Impact
Windows Error Reporting Local Privilege Escalation Exploit BOF The vulnerability exists due to application does not properly impose security restrictions in Windows Error Reporting Service, which leads to security restrictions bypass and privilege escalation and allows a local user (non included in Administrator group) to escalate privileges to NT AUTHORITY\SYSTEM. Windows Exploits / Local / Privilege Escalation Impact
WinRAR File Extension Spoofing Code Execution Exploit In WinRAR versions prior to 6.23, there is a vulnerability that allows attackers to execute arbitrary code. This vulnerability occurs when a user tries to open a harmless file within a ZIP archive. The issue arises when the ZIP archive contains a benign file, such as a regular .PDF file, and also a folder with the same name as the benign file. During an attempt to access the benign file, the contents of the folder, which may include executable content, are processed, leading to the execution of arbitrary code. Windows Exploits / Client Side Impact
Linux Kernel OverlayFS Logic Upper Attributes Local Privilege Escalation Exploit A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system. Linux Exploits / Local / Privilege Escalation Impact
Progress MOVEit Transfer UserProcessPassChangeRequest SQL Injection Vulnerability Exploit This module exploits an SQL injection to deploy an agent in Progress MOVEit Transfer. The vulnerability is in the UserCheckClientCert function of MOVEit.DMZ.ClassLib.UserEngine class. The deployed agent will run with moveitsvc user privileges. Windows Exploits / OS Command Injection / Known Vulnerabilities Impact
Progress MOVEit Transfer UserProcessPassChangeRequest SQL Injection Vulnerability Webapp Exploit This module exploits an SQL injection to deploy an agent in Progress MOVEit Transfer. The vulnerability is in the UserProcessPassChangeRequest function of MOVEit.DMZ.ClassLib.UserEngine class. The deployed agent will run with moveitsvc user privileges. Windows Exploits / OS Command Injection / Known Vulnerabilities Impact
Microsoft Windows Win32k xxxEnableMenuItem Elevation of Privilege Exploit An elevation of privilege vulnerability exists due to the Windows kernel improperly validating input passed from user mode to the kernel. The vulnerability could allow an attacker to run code with elevated privileges. Windows Exploits / Local / Privilege Escalation Impact
PaperCut MF Path Traversal Vulnerability Checker PaperCut NG and PaperCut MF before 22.1.3 on Windows allow path traversal. This module tries to determine remotely, if the target host is either vulnerable to CVE-2023-39143 or not. Windows Information gathering / Vulnerability checkers Impact
Progress MOVEit Transfer UserCheckClientCert SQL Injection Vulnerability Exploit This module exploits an SQL injection to deploy an agent in Progress MOVEit Transfer. The vulnerability is in the UserCheckClientCert function of MOVEit.DMZ.ClassLib.UserEngine class. The deployed agent will run with moveitsvc user privileges. Windows Exploits / OS Command Injection / Known Vulnerabilities Impact
Progress MOVEit Transfer UserCheckClientCert SQL Injection Vulnerability Webapp Exploit This module exploits an SQL injection to deploy an agent in Progress MOVEit Transfer. The vulnerability is in the UserCheckClientCert function of MOVEit.DMZ.ClassLib.UserEngine class. The deployed agent will run with moveitsvc user privileges. Windows Exploits / OS Command Injection / Known Vulnerabilities Impact
Citrix ADC and Gateway ns_aaa_gwtest_get_event_and_target_names Remote Code Execution Exploit This exploit uses a format stack buffer overflow located in the rlprd ns_aaa_gwtest_get_event_and_target_names() function to install an agent. The deployed agent will run with root user privileges. FreeBSD Exploits / Remote Impact
VMware Aria Operations for Logs InternalClusterController Java Deserialization Vulnerability Remote Code Execution Exploit This module exploits a java deserialization vulnerability present in InternalClusterController class that is reachable via several endpoints of VMware Aria Operations for Logs. The deployed agent will run with root privileges. Linux Exploits / Remote Code Execution Impact
Foxit PDF Reader Export XFA Data Arbitrary File Write Exploit Foxit PDF Reader, in an oversight, exposes a JavaScript interface capable of writing arbitrary files. This mishap is what makes the software susceptible to attacks. An adversary can manipulate this vulnerability to execute code within the context of the current user, thereby gaining unauthorized control over the system. The vulnerable method is exportXFAData. This exploit will write the agent to the startup folder. This means that the user must logoff and login again in order to execute the agent. Windows Exploits / Client Side Impact
Wacom Drivers for Windows Local Privilege Escalation Exploit The specific flaw exists within the Tablet Service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Windows Exploits / Local / Privilege Escalation Impact
IBM i Distributed Data Management Remote CL Command Injection Exploit This module exploits an CL Command Injection in IBM i DDM Service to upload an agent as a .zip file to a writable directory using printf commands in a QSHell session. Then another QSHell session is used to execute it and then remove the zip file. Exploits / OS Command Injection / Known Vulnerabilities Impact
Windows Common Log File System Driver Local Privilege Escalation Exploit (CVE-2023-28252) An attacker who successfully exploited the vulnerability could execute code with elevated permissions. Windows Exploits / Local / Privilege Escalation Impact