Core Certified Exploits

Library of expert validated exploits for safe and effective pen tests

Browse the Core Certified Exploit Library  

 

Exploit development can be an advanced penetration testing skill that takes time to master. Additionally, when on a job, pen testers often don’t have the resources to create a new exploit. Many resort to searching for and using pre-written exploits that have not been tested and must go through the timely effort of quality assurance testing in order to ensure they are secure and effective.

Core Impact users can save time by finding all the up-to-date exploits they need in one place. We provide a robust library of exploits designed to enable pen testers to safely and efficiently conduct successful penetration tests. Witten by our own internal team, you can trust they have been thoroughly tested and validated by our experts.

The universe of vulnerabilities is huge and not all of them represent the same risk for the customers. Vulnerabilities do not all have the same level of criticality. Some may be easily exploitable by a low-level user, while others may not be exploitable at all. To increase the efficiency of the attacks and the quality of the exploits provided, the Core Impact team has developed selection criteria to prioritize its analysis and implementation. We determine which exploits warrant creation based on the following questions:

  • What are the most critical attacks from the attacker’s perspective?
  • What new vulnerabilities are more likely to be exploited in real attacks?
  • What exploits are the most valuable for Core Impact?

Once an exploit is approved, its priority order considers the following variables: 

  • Vulnerability Properties: CVE, disclosure date, access mechanism and privileges needed.
  • Target Environment Setup: OS, application prevalence, version and special configurations needed.
  • Value Provided to Core Impact: Customer request, usage in multiple attacks, allows the installation of an agent, etc.
  • Technical Cost vs. Benefit: An analysis weighing the resources needed to build an exploit with the internal and external knowledge gained in its creation. 

Each one of these variables has a different weight and provides a ranking of the potential exploits to be developed. Following those criteria, the top of the list would contain, for example, a vulnerability on Windows (most popular OS) that can be exploited remotely, without authentication and that provides super user privileges. 

Correspondingly, a vulnerability on an application that is rarely installed, needs special configurations, and requires User Interaction, would be at the bottom.

Stay Informed of New Core Certified Exploits

Subscribe to receive regular email updates on new exploits available for Core Impact

Browse the Core Certified Exploit Library

We provide pen testers with real-time updates for a wide range of exploits for different platforms, operating systems, and applications. 

Search our continuously growing library to discover an exploit that will allow you to gain and retain access on the target host or application.

Title Description Date Added CVE Link Exploit Platform Exploit Type Product Name
Windows Ks Driver KSPROPERTY Privilege Escalation Exploit A vulnerability in Kernel Streaming (ks.sys driver) allows arbitrary IOCTL_KS_PROPERTY operations. A double fetch vulnerability in KspPropertyHandler, can be used to gain system privileges. Windows Exploits / Local Impact
NextGen Healthcare Mirth Connect Deserialization Remote Code Execution Exploit CVE-2023-43208 stems from an insecure data deserialization process in Mirth Connect's use of the XStream library, which improperly processes untrusted XML payloads.This deserialization flaw enables us to exploit the system by sending crafted XML requests to execute code remotely on the server. Windows, Linux Exploits / Remote Code Execution Impact
Arcserve Unified Data Protection wizardLogin Authentication Bypass Vulnerability Remote Code Execution Exploit A chain of vulnerabilities in Arcserve Unified Data Protection allows unauthenticated remote attackers to execute system commands. Windows Exploits / Authentication Weakness / Known Vulnerabilities Impact
Microsoft Windows Telephony Server Use After Free Local Privilege Escalation Exploit Use-after-free vulnerability in the telephony service can lead to a Local Privilege Escalation in TapiSrv. Windows Exploits / Local Impact
Microsoft Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability Exploit An elevation of privilege vulnerability exists due to the MS KS WOW Thunk kernel module allow accessing memory out of bounds. The vulnerability could allow an attacker to run code with elevated privileges. Windows Exploits / Local Impact
Linux OpenPrinting cups-browsed Remote Code Execution Exploit A chain of vulnerabilities in cups-browsed, libcupsfilters, libppd and cups-filters allows unauthenticated remote attackers to execute system commands. Linux Exploits / Remote Code Execution Impact
GeoServer Unauthenticated Remote Code Execution Exploit In GeoServer prior to versions 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. Windows, Linux Exploits / Remote Code Execution Impact
Windows System Drive Remapping Local Privilege Escalation Exploit Update This update adds support for domain users, improved user group validation, agent stability, and improved module output messages. Windows Exploits / Local Impact
Microsoft Smart App and Mark of the Web bypass tool using LNK stomping This exploit uses a technique called LNK stomping that allows specially crafted LNK files with non-standard target paths or internal structures to cause the file to be opened while bypassing Smart App Control and the Mark of the Web security warnings. Windows Exploits / Tools Impact
Veeam Backup and Replication Blacklist ObjRef NET Deserialization Vulnerability Remote Code Execution Exploit Veeam Backup and Replication deserialization of System.Runtime.Remoting.ObjRef .NET class type allows unauthenticated remote attackers to execute system commands in the context of the NT AUTHORITY\SYSTEM user. Windows Exploits / Remote Code Execution Impact
Microsoft Outlook Moniker Image Tag Information Disclosure Exploit (CVE-2024-38021) This exploit leverages an information disclosure vulnerability in Microsoft Outlook. By using an image tag, unauthorized access can be obtained, allowing for the theft of NTLM hashes. Windows Exploits / Client Side Impact
Progress WhatsUp Gold GetFileWithoutZip Directory Traversal Vulnerability Remote Code Execution Exploit A directory traversal Vulnerability in the WhatsUp.ExportUtilities.Export.GetFileWithoutZip method of Progress WhatsUp Gold allows unauthenticated remote attackers to write arbitrary files in the system leading to execute system commands in the context of the IIS APPPOOL\NmConsole user. Windows Exploits / Remote Code Execution Impact
GitLab Password Reset Account Takeover Exploit This module exploits an issue in GitLab CE/EE that allows sending reset emails to an unverified email address. In order to takeover the account, the module will exploit the vulnerability adding the attacker's email to the JSON from /users/password endpoint, then it will connect via IMAP to the attacker's email, parse the reset email and change the password. All versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 are affected. Linux Exploits / Remote Impact
Ivanti Connect Secure SAML SSRF Unauthenticated Remote Code Execution Exploit Update This module chains together three vulnerabilities to deploy a Core Impact agent with root privileges. First vulnerability CVE-2023-46805 is used to obtain the exact version of Ivanti Connect Secure installed on the system. Next, the module exploits a second vulnerability CVE-2024-21893 that allows the attacker to access certain restricted resources without authentication, leveraging a flaw in the SAML component. Linux Exploits / Remote Code Execution Impact
Ivanti Connect Secure SAML SSRF Unauthenticated Remote Code Execution Exploit A server-side request forgery (SSRF) vulnerability has been identified in the SAML component of Ivanti Connect Secure (versions 9.x and 22.x), Ivanti Policy Secure (versions 9.x and 22.x), and Ivanti Neurons for ZTA. This vulnerability, designated CVE-2024-21893, allows an attacker to access restricted resources without authentication. Linux Exploits / Remote Code Execution Impact
Magento eCommerce Web Sites CosmicSting and CNEXT Remote Code Execution Exploit Update An XML External Entity Reference and a heap buffer overflow in the iconv() function of the GNU C Library allows unauthenticated remote attackers to execute system commands in Magento eCommerce Web Sites. This update adds module documentation and fixes some errors. Linux Exploits / Remote Code Execution Impact
Magento eCommerce Web Sites CosmicSting and CNEXT Remote Code Execution Exploit An XML External Entity Reference and a heap buffer overflow in the iconv() function of the GNU C Library allows unauthenticated remote attackers to execute system commands in Magento eCommerce Web Sites. Linux Exploits / Remote Code Execution Impact
Microsoft Windows Kernel AuthzBasepCopyoutInternalSecurityAttributes Elevation of Privilege Vulnerability Exploit The Windows NT operating system kernel executable (ntoskrnl.exe) present in Microsoft Windows is vulnerable to a race condition, which can result in arbitrary memory write. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges. Windows Exploits / Local Impact
Microsoft Windows DWMCORE Elevation of Privilege Vulnerability The vulnerability exists due to a boundary error within the Windows DWMCORE library. A local user can trigger a heap-based buffer overflow and execute arbitrary code with the DWM user with Integrity System privileges. Windows Exploits / Local Impact
Ivanti Core Server EPM Remote Code Execution Exploit An SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. Windows Exploits / Remote Code Execution Impact
Microsoft Exchange Proxylogon Remote Code Execution Vulnerability Exploit Update A combination of a server-side request forgery vulnerability and an arbitrary file write vulnerability, allows unauthenticated attackers to execute commands with SYSTEM privileges in Microsoft Exchange Server.



This update adds several parameters for module flexibility; more log verbosity on errors and fixes a bug when using autodiscover to retrieve email SID.
Windows Exploits / Remote Code Execution Impact
FileCatalyst Workflow JOBID SQL Injection Vulnerability Exploit A SQL injection vulnerability in Fortra FileCatalyst Workflow versions 5.1.6 build 135 and earlier allows remote attackers, including anonymous ones, to exploit a SQL injection via the JOBID parameter.

This could lead to unauthorized SQL commands execution such as table deletion or admin user creation. This module without authentication creates an administrative user, proceeds to authenticate with this newly created user to assess if the system is vulnerable.
Linux Exploits / Remote Impact
Microsoft Streaming Service Elevation of Privilege Vulnerability Exploit (CVE-2023-36802) Update This update adds reliability improvements to check if the target is vulnerable. Windows Exploits / Local Impact
Progress Telerik Report Server XmlSerializer NET Deserialization Vulnerability Remote Code Execution Exploit An Authentication bypass and a .NET deserialization vulnerability allows unauthenticated remote attackers to execute system commands in Progress Telerik Report Server. Windows Exploits / Authentication Weakness / Known Vulnerabilities Impact
SolarWinds Serv-U FTP Server Path Traversal Vulnerability Exploit An unauthenticated remote attacker could exploit this vulnerability by sending a specially crafted request to a vulnerable server. Successful exploitation would allow an attacker to read files from the underlying operating system, which may include sensitive information such as user data (which may include encrypted passwords) Windows, Linux Exploits / Remote File Disclosure Impact