Core Certified Exploits

Library of expert validated exploits for safe and effective pen tests

Browse the Core Certified Exploit Library  

 

Exploit development can be an advanced penetration testing skill that takes time to master. Additionally, when on a job, pen testers often don’t have the resources to create a new exploit. Many resort to searching for and using pre-written exploits that have not been tested and must go through the timely effort of quality assurance testing in order to ensure they are secure and effective.

Core Impact users can save time by finding all the up-to-date exploits they need in one place. We provide a robust library of exploits designed to enable pen testers to safely and efficiently conduct successful penetration tests. Witten by our own internal team, you can trust they have been thoroughly tested and validated by our experts.

The universe of vulnerabilities is huge and not all of them represent the same risk for the customers. Vulnerabilities do not all have the same level of criticality. Some may be easily exploitable by a low-level user, while others may not be exploitable at all. To increase the efficiency of the attacks and the quality of the exploits provided, the Core Impact team has developed selection criteria to prioritize its analysis and implementation. We determine which exploits warrant creation based on the following questions:

  • What are the most critical attacks from the attacker’s perspective?
  • What new vulnerabilities are more likely to be exploited in real attacks?
  • What exploits are the most valuable for Core Impact?

Once an exploit is approved, its priority order considers the following variables: 

  • Vulnerability Properties: CVE, disclosure date, access mechanism and privileges needed.
  • Target Environment Setup: OS, application prevalence, version and special configurations needed.
  • Value Provided to Core Impact: Customer request, usage in multiple attacks, allows the installation of an agent, etc.
  • Technical Cost vs. Benefit: An analysis weighing the resources needed to build an exploit with the internal and external knowledge gained in its creation. 

Each one of these variables has a different weight and provides a ranking of the potential exploits to be developed. Following those criteria, the top of the list would contain, for example, a vulnerability on Windows (most popular OS) that can be exploited remotely, without authentication and that provides super user privileges. 

Correspondingly, a vulnerability on an application that is rarely installed, needs special configurations, and requires User Interaction, would be at the bottom.

Stay Informed of New Core Certified Exploits

Subscribe to receive regular email updates on new exploits available for Core Impact

Browse the Core Certified Exploit Library

We provide pen testers with real-time updates for a wide range of exploits for different platforms, operating systems, and applications. 

Search our continuously growing library to discover an exploit that will allow you to gain and retain access on the target host or application.

Title Description Date Added CVE Link Exploit Platform Exploit Type Product Name
Publish-It Buffer PUI File Buffer Overflow Exploit This module exploits a buffer overflow on Publish-It when parsing a malformed .PUI file. Windows Exploits / Client Side Impact
QQPlayer File Processing Buffer Overflow Exploit QQPlayer contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in QQPlayer when handling .ASX files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .ASX file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it. Windows Exploits / Client Side Impact
Quest InTrust AnnotateX ActiveX Exploit This module exploits a vulnerability in AnnotateX.dll included in the Quest InTrust application. The exploit is triggered when the Add() method is invoked with a crafted object argument. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability. Windows Exploits / Client Side Impact
QuickBooks Pro 2010 dbicudtx10 DLL Hijacking Exploit QuickBooks Pro 2010 is prone to a vulnerability that may allow the execution of any library file named dbicudtx10.dll, if this dll is located in the same folder than a .QPG file. The attacker must entice a victim into opening a specially crafted .QPG file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code. Windows Exploits / Client Side Impact
QuickTime JPEG Exploit This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by triggering a Apple QuickTime PictureViewer vulnerability. Windows Exploits / Client Side Impact
QuickTime Player Streaming Debug Error Logging Buffer Overflow Exploit A stack buffer overflow exists in QuickTime's error logging. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability. Windows Exploits / Client Side Impact
QuickTime RTSP URL exploit This module runs a web server waiting for vulnerable clients (QuickTime browser plugin) to connect to it. When the client connects, it will try to install an agent by sending a specially crafted HTML page which exploits the Apple Quicktime RTSP URL Handling Vulnerability. When Outlook Express is used as mail user agent, Internet Explorer can be exploited through sending the target an e-mail that contains a link to the specially designed HTML page that triggers the attack. The vulnerability is caused due to a boundary error when handling RTSP URLs. Windows Exploits / Client Side Impact
QuickTime RTSP Content-Type exploit This module runs a server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting a vulnerability in Apple QuickTime, which allows unauthenticated attackers to execute arbitrary code or cause a denial of service condition. The module will send an e-mail with a specially crafted HTML page waiting for victim users to connect through it. When the user clicks on the link, a connection is made to a specially crafted RTSP stream that triggers the vulnerability. Windows, Mac OS X Exploits / Client Side Impact
Quick View Plus Client Vsacs Buffer Overflow Exploit Quick View Plus contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in Quick View Plus when handling .MDB files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .MDB file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it by opening the crafted MDB file with Quick View Plus. Windows Exploits / Client Side Impact
Quiksoft EasyMail AddAttachment Method ActiveX Control Buffer Overflow Exploit This module exploits a vulnerability in emsmtp.dll included in the Quiksoft EasyMail application. The exploit is triggered when the AddAttachment() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability. Windows Exploits / Client Side Impact
RadAsm WindowCallProcA Pointer Hijack Exploit The vulnerability is caused due to a boundary error in the processing of .RAP files. This can be exploited to cause a stack-based buffer overflow by tricking a user into decoding a specially crafted .RAP file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it. Windows Exploits / Client Side Impact
RainbowPlayer RPL Buffer Overflow Exploit RainbowPlayer contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in RainbowPlayer when handling .RPL files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .RPL file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it. Windows Exploits / Client Side Impact
RealNetworks Arcade Games ActiveX Control Exploit This module runs a web server waiting for vulnerable clients (Internet Explorer with a vulnerable StubbyUtil.InstallerDlg.1 ActiveX Control) to connect to it. When the client connects, it will try to install an agent by sending a specially crafted HTML page which exploits the Real Networks Arcade Game's ActiveX control. ActiveX Control Remote Code Execution Vulnerability. The affected ActiveX control is installed when choosing to play any game from Realnetworks Arcade http://www.gamehouse.com/ Windows Exploits / Client Side Impact
RealNetworks RealPlayer CDDA URI ActiveX Exploit This module exploits a vulnerability in RealPlayer. The vulnerable software does not properly initialize an unspecified object component during parsing of a malformed CDDA URI. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. This module runs a web server waiting for vulnerable clients (Internet Explorer 6 or 7) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability. Windows Exploits / Client Side Impact
RealNetworks RealPlayer QCP Parsing Buffer Overflow Exploit A code execution vulnerability exists in the way that RealPlayer handles specially crafted .QCP files when opening in Internet Explorer 6,7 and 8 This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability. Windows Exploits / Client Side Impact
RealPlayer Cook Codec Channel Parsing Code Execution Exploit A code execution vulnerability exists in the way that RealPlayer parses files encoded with Cook codec. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability. Windows Exploits / Client Side Impact
RealPlayer RealMedia File Buffer Overflow Exploit RealPlayer is prone to a stack based buffer overflow when opening specially crafted Real Media files. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it. Windows Exploits / Client Side Impact
RealPlayer rmoc3260.dll ActiveX Buffer Overflow Exploit This module exploits a heap-based buffer overflow in the rmoc3260.dll ActiveX Control included in Real Player 11. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability. Windows Exploits / Client Side Impact
RealPlayer TRACKID tag handling RMP Buffer Overflow Exploit Real Media Player are vulnerable to a heap buffer overflow when provided with a specially crafted .rmp file with malformed TRACKID tags. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it. Windows Exploits / Client Side Impact
Realtek Media Player Playlist Buffer Overflow Exploit Realtek Media Player contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error when handling .PLA files. . This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it. Windows Exploits / Client Side Impact
RealPlayer ActiveX Buffer Overflow Exploit This module exploits a vulnerability caused due to a boundary error in the ierpplug.dll of the RealPlayer application. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability. Windows Exploits / Client Side Impact
Real Networks RealPlayer SP RecordClip Exploit This module exploits an arbitrary file download vulnerability in the RecordingManager Control included in RealPlayer SP. This module runs a web server waiting for vulnerable clients (Internet Explorer 6 and 7) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability. Windows Exploits / Client Side Impact
Real Player MS HelpCenter Command Execution Exploit (MS10-042) This module exploits a vulnerability caused due to an error in the MPC::HTML::UrlUnescapeW() function in helpctr.exe when escaping URLs, and add attack vector directly from Real Player to original Internet Explorer attack This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability. Windows Exploits / Client Side Impact
RealPlayer SMIL wallclock Buffer Overflow Exploit This module exploits a vulnerability caused due to a boundary error in the wallclock functionality in "SmilTimeValue::parseWallClockValue()" when handling time formats. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability. Windows Exploits / Client Side Impact
ReGet Deluxe WJR File Buffer Overflow Exploit The vulnerability is caused due to a boundary error in the processing of .WJR files. This can be exploited to cause a stack-based buffer overflow by tricking the user into opening a .WJR file containing an overly long Save To field. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it. Windows Exploits / Client Side Impact