Core Certified Exploits

We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Subscribe to receive regular updates by email:

 

Browse All Exploits

 

 

Title Description CVE Link Exploit Platform Exploit Type
Drupal RESTful Web Services Module Remote PHP Command Injection Exploit RESTful Web Services Module does not properly sanitize data from non-form sources. A vulnerability in this approach allows an unauthenticated attacker to send specially crafted requests resulting in arbitrary PHP execution. Linux Exploits/OS Command Injection/Known Vulnerabilities
Cisco Webex Meetings webexservice Update Service ptUpdate Downgrade Local Privilege Escalation Exploit A vulnerability in the update service of Cisco Webex Meetings Desktop App for Windows could allow an authenticated local attacker, to execute arbitrary commands with SYSTEM user privileges. Windows Exploits/Local
Dokany Google Drive File Stream Kernel Buffer Overflow Privileged Escalation Exploit Dokan redistributable are vulnerable to a buffer overflow in the dokan1.sys driver. An attacker can create a device handle to the system driver and send arbitrary input that will trigger the vulnerability. Windows Exploits/Local
Linux snapd dirty_sock Local Privilege Escalation Exploit Update This module exploits a vulnerability in snapd which incorrectly validates and parses the remote socket address when performing access controls on its UNIX socket. A local attacker could use this to access privileged socket APIs and obtain administrator privileges. This update adds support for more platforms. Linux Exploits/Local
Linux snapd dirty_sock Local Privilege Escalation Exploit This module exploits a vulnerability in snapd which incorrectly validates and parses the remote socket address when performing access controls on its UNIX socket. A local attacker could use this to access privileged socket APIs and obtain administrator privileges. Linux Exploits/Local
Kibana local file inclusion Exploit Specific versions of Kibana do not validate paths on a specific GET request, this can be exploited in order to execute local javascript files on the target system Linux
Microsoft Windows DCOM-RPC NTLM Reflection Elevation of Privilege Exploit This update adds an exploit which implements the Rotten Potato technique to perform a Local Privilege Escalation. It leverages on local DCOM DCE/RPC connections that can be reflected back to a listening TCP socket allowing access to an NTLM authentication challenge for LocalSystem user which can be replayed to the local DCOM activation service. An attacker who successfully exploited this vulnerability could bypass security and gain elevated privileges on a targeted system. Windows Exploits/Local
OracleDB TNS Listener Remote Poisoning Vulnerability Detector Oracle Database Server is prone to a remote vulnerability that allows attackers to poison the data handled by the remote 'TNS Listener' component of the application. This module tries to verify if the vulnerability is present in the 'TNS Listener' component of the database server, without deploying an agent. Windows Exploits/Remote
Advantech WebAccess SCADA BwPAlarm Buffer Overflow Exploit Advantech WebAccess SCADA lack of proper validation of user supplied input may allow an attacker to cause the overflow of a buffer overflow and executes remote code. Windows Exploits/Remote
Horner Automation Cscape CSP File Buffer Overflow Exploit The specific flaw exists within the parsing of CSP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. Windows Exploits/Client Side
TFM MMPlayer Buffer Overflow Exploit A Buffer Overflow exists when parsing .M3U files. The vulnerability is caused due to a boundary error when handling a crafted .M3U files. Windows Exploits/Client Side
Omron CX-One CXP File Buffer Overflow Exploit The specific flaw exists within the parsing of CXP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. Windows Exploits/Client Side
PCManFTPD Server APPE Command Buffer Overflow Exploit2 Server is prone to a stack-based buffer overflow vulnerability when processing long requests. This flaw can be exploited to execute arbitrary code by sending the server a special crafted request. Windows Exploits/Remote
VUPlayer Stack Buffer Overflow Exploit A Buffer Overflow exists when parsing .PLS files. The vulnerability is caused due to a boundary error when handling a crafted .PLS files. Windows Exploits/Client Side
Cisco Webex Meetings webexservice Update Service SMB Remote Code Execution Exploit A vulnerability in the update service of Cisco Webex Meetings Desktop App for Windows could allow an authenticated remote attacker, to execute arbitrary commands with SYSTEM user privileges. Windows Exploits/Remote
ASUS Low Level Access Drivers Privilege Escalation Exploit This module exploits a vulnerability in various ASUS and 3rd party branded utilities. The low level access drivers at the core of these utilities expose dangerous functionality to low privilege processes, a local attacker can read/write arbitrary kernel memory, which can be leveraged to elevate privileges. Windows Exploits/Local
GIGABYTE Low Level Access Drivers Privilege Escalation Exploit This module exploits a vulnerability in various GIGABYTE and AORUS branded utilities. The low level access drivers at the core of these utilities expose dangerous functionality to low privilege processes, a local attacker can read/write arbitrary kernel memory, which can be leveraged to elevate privileges. Windows Exploits/Local
Microsoft Windows Win32k xxxMNEndMenuState Local Privilege Escalation Exploit An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. Windows Exploits/Local
Advantech WebAccess webvrpcs Remote Command Execution Exploit The specific flaw exists within the implementation of the 0x2711 IOCTL in the webvrpcs process. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. Windows Exploits/Remote
CyberLink LabelPrint File Project Processing Buffer Overflow Exploit Stack-based buffer overflows in CyberLink LabelPrint 2.5 allow remote attackers to execute arbitrary code via the (1) author (inside the INFORMATION tag), (2) name (inside the INFORMATION tag), (3) artist (inside the TRACK tag), or (4) default (inside the TEXT tag) parameter in an lpp project file. Windows Exploits/Client Side
CMS Made Simple Module Import PHP Remote Command Injection Vulnerability Exploit CMS Made Simple allows remote authenticated administrators to execute arbitrary PHP code via command injection using the module import feature in admin/moduleinterface.php Windows Exploits/Remote File Inclusion/Known Vulnerabilities
Free WMA MP3 Converter Local Buffer Overflow Exploit A Local Buffer Overflow exists when parsing .wav files. The vulnerability is caused due to a boundary error when handling a crafted .wav files. Windows Exploits/Client Side
Microsoft Windows SchRpcSetSecurity Local Privilege Escalation Exploit An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC).An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Windows Exploits/Local
10-Strike LANState Local Buffer Overflow Exploit A Buffer Overflow exists when parsing .lsm files. The vulnerability is caused due to a boundary error when handling a crafted .lsm files. Windows Exploits/Client Side
Cisco Webex Meetings webexservice Update Service DLL Hijacking Local Privilege Escalation Exploit A vulnerability in the update service of Cisco Webex Meetings Desktop App for Windows could allow an authenticated local attacker, to execute arbitrary commands with SYSTEM user privileges. Windows Exploits/Local