Core Certified Exploits
We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.
Subscribe to receive regular updates by email:
Browse All Exploits
|Title||Description||Date Added||CVE Link||Exploit Platform||Exploit Type|
|Atlantis Word Processor JPEG Length Underflow Exploit||An exploitable stack-based buffer overflow vulnerability exists in the JPEG parser of Atlantis Word Processor.||November 13, 2018||CVE-2018-3999||Windows||Exploits / Client Side|
|VBScript Engine UAF Exploit||A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system.||November 8, 2018||CVE-2018-8373||Windows||Exploits / Client Side|
|Microsoft Windows Shell Remote Code Execution Vulnerability Exploit (CVE-2018-8414)||Microsoft Windows Shell does not properly validate file paths, allowing the execution of ".SettingContent-ms" files from outside the "ImmersiveControlPanel" folder.||November 8, 2018||CVE-2018-8414||Windows||Exploits / Client Side|
|phpMyAdmin index.php Local File Inclusion Vulnerability Exploit||phpMyAdmin is vulnerable to local file inclusion, which can be exploited post-authentication to execute PHP code by the application.||October 31, 2018||CVE-2018-12613||Windows, Linux||Exploits / Local File Inclusion|
|Delta Industrial Automation CNCSoft ScreenEditor DPB File wKPFString Exploit||The specific flaw exists within the handling of DPB files. When parsing the wKPFString attribute, the process does not properly validate the length of user-supplied data.||October 30, 2018||CVE-2018-10636||Windows||Exploits / Client Side|
|Free MP3 CD Ripper Buffer Overflow SEH Exploit||A Buffer Overflow exists when parsing .mp3/wma files. The vulnerability is caused due to a boundary error when handling a crafted .mp3/wma files.||October 25, 2018||NOCVE-9999-114871||Windows||Exploits / Client Side|
|ASROCK Low Level Access Drivers Privilege Escalation Exploit||This module exploits a vulnerability in various ASROCK utilities. The low level access drivers at the core of these utilities expose dangerous functionality to low privilege processes, a local attacker can read/write arbitrary kernel memory, which can be leveraged to elevate privileges.||October 25, 2018||CVE-2018-10709||Windows||Exploits / Local|
|Fortinet FortiClient IOCTL 220028 Local Privilege Escalation Exploit||The Fortishield.sys driver in Fortinet FortiClient before 5.2.4 allows local users to execute arbitrary code with kernel privileges by setting the callback function in a (1) 0x220024 or (2) 0x220028 ioctl call.||October 23, 2018||CVE-2015-5736||Windows||Exploits / Local|
|Easy File Sharing Web Server POST UserID Cookie Buffer Overflow Exploit||Stack-based buffer overflow in Easy File Sharing (EFS) Web Server 7.2 allows remote attackers to execute arbitrary code via a malicious login request to forum.ghp||October 18, 2018||CVE-2018-9059||Windows||Exploits / Remote|
|Fuji Electric V-Server VPR File Parsing Buffer Overflow Exploit (CVE-2018-10637)||The specific flaw exists within the processing of VPR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer.||October 11, 2018||CVE-2018-10637||Windows||Exploits / Client Side|
|Wecon LeviStudioU Screendata IndirectAddrR Heap-based Buffer Overflow Exploit||The specific flaw exists within the handling of HSC files. When parsing the IndirectAddrR attribute, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of Administrator.||October 9, 2018||CVE-2018-10606||Windows||Exploits / Client Side|
|D-Link Central WiFiManager FTP Server Default Credentials Remote PHP File Upload Vulnerability Exploit Update||D-Link Central WiFiManager has an FTP server listening on port 9000 by default with fixed credentials. This allows to unauthenticated users to upload and execute PHP files in the web root, leading to remote code execution.
This update fixes vulnerability URLs
|October 5, 2018||CVE-2018-17440||Windows||Exploits / Remote File Inclusion / Known Vulnerabilities|
|D-Link Central WiFiManager FTP Server Default Credentials Remote PHP File Upload Vulnerability Exploit||D-Link Central WiFiManager has an FTP server listening on port 9000 by default with fixed credentials. This allows to unauthenticated users to upload and execute PHP files in the web root, leading to remote code execution.||October 4, 2018||CVE-2018-17440||Windows||Exploits / Remote File Inclusion / Known Vulnerabilities|
|Hewlett Packard Enterprise Intelligent Management Center dbman Opcode 10006 Command Injection Exploit||The specific flaw exists within the dbman service, which listens on TCP port 2810 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute arbitrary code under the context of SYSTEM.||September 25, 2018||NOCVE-9999-114676||Windows||Exploits / Remote|
|Iolo System Shield AntiVirus and AntiSpyware Arbitrary Write Amp Local Privilege Escalation Exploit||In Iolo System Shield AntiVirus and AntiSpyware 188.8.131.52, the amp.sys driver file contains an Arbitrary Write vulnerability.||September 19, 2018||CVE-2018-5701||Windows||Exploits / Local|
|Boxoft WAV to MP3 Converter Buffer Overflow Exploit||A Buffer Overflow exists when parsing .wav files. The vulnerability is caused due to a boundary error when handling a crafted .wav files.||September 11, 2018||CVE-2015-7243||Windows||Exploits / Client Side|
|ABB Panel Builder bemodbus Heap Overflow Exploit||ABB Panel Builder is prone to a Heap-Overflow when handling specially cracted .PBA files.||September 11, 2018||CVE-2018-10616||Windows||Exploits / Client Side|
|Opsview Monitor testnotification Remote OS Command Injection Exploit||Opsview Web Management console allows to an authenticated administrator to test notifications that are triggered under certain configurable events.
The 'value' parameter is not properly sanitized, leading to an arbitrary command injection executed on the system with nagios user privileges.
|September 4, 2018||CVE-2018-16146||Linux||Exploits / OS Command Injection / Known Vulnerabilities|
|Hewlett Packard Enterprise Intelligent Management Center tftpserver getFileData Exploit||The specific flaw exists within the handling of the m_pkg_LimitSize parameter provided to the tftpserver.||August 27, 2018||CVE-2018-10594||Windows||Exploits / Remote|
|Oracle WebLogic Server RMI Registry UnicastRef Object Java Deserialization Remote Code Execution Exploit||Oracle WebLogic Server is prone to a remote vulnerability due to deserialization of untrusted inputs, allowing attackers to instantiate arbitrary Java objects leading to remote code execution.||August 22, 2018||CVE-2017-3248||Solaris, Windows, Linux||Exploits / Remote|
|Eaton 9000XDrive TLF File Buffer Overflow Exploit||The specific flaw exists within the processing of a TLF file. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer.||August 22, 2018||CVE-2018-8847||Windows||Exploits / Client Side|
|Sophos SafeGuard Enterprise Arbitrary Write SGStDrvm Local Privilege Escalation Exploit||Sophos SafeGuard Enterprise before 8.00.5, SafeGuard Easy before 7.00.3, and SafeGuard LAN Crypt before 3.95.2 are vulnerable to Local Privilege Escalation via multiple IOCTLs.||August 17, 2018||CVE-2018-6854||Windows||Exploits / Local|
|SoftNAS Cloud OS Command Injection Exploit||SoftNAS Cloud is a software-defined NAS filer delivered as a virtual storage appliance that runs within public, private or hybrid clouds. SoftNAS Cloud provides enterprise-grade NAS capabilities, including encryption, snapshots, rapid rollbacks, and cross-zone high-availability with automatic failover.
A command injection vulnerability was found in the web administration console. In particular, snserv script did not sanitize some input parameters before executing a system command.
|August 15, 2018||CVE-2018-14417||Linux||Exploits / OS Command Injection|
|Wecon LeviStudioU Screenhelper BgOnOffBitAddr Buffer Overflow Exploit||The specific flaw exists within the handling of UMP files. When parsing the BgOnOffBitAddr element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can leverage this vulnerability to execute code under the context of Administrator||August 9, 2018||CVE-2018-10602||Windows||Exploits / Client Side|
|Wecon LeviStudioU Usermanage GroupList Description Buffer Overflow Exploit||This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Wecon LeviStudioU UserManage. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
||August 8, 2018||CVE-2018-10602||Windows||Exploits / Client Side|