Core Certified Exploits

Library of expert validated exploits for safe and effective pen tests

Browse the Core Certified Exploit Library  

 

Exploit development can be an advanced penetration testing skill that takes time to master. Additionally, when on a job, pen testers often don’t have the resources to create a new exploit. Many resort to searching for and using pre-written exploits that have not been tested and must go through the timely effort of quality assurance testing in order to ensure they are secure and effective.

Core Impact users can save time by finding all the up-to-date exploits they need in one place. We provide a robust library of exploits designed to enable pen testers to safely and efficiently conduct successful penetration tests. Witten by our own internal team, you can trust they have been thoroughly tested and validated by our experts.

The universe of vulnerabilities is huge and not all of them represent the same risk for the customers. Vulnerabilities do not all have the same level of criticality. Some may be easily exploitable by a low-level user, while others may not be exploitable at all. To increase the efficiency of the attacks and the quality of the exploits provided, the Core Impact team has developed selection criteria to prioritize its analysis and implementation. We determine which exploits warrant creation based on the following questions:

  • What are the most critical attacks from the attacker’s perspective?
  • What new vulnerabilities are more likely to be exploited in real attacks?
  • What exploits are the most valuable for Core Impact?

Once an exploit is approved, its priority order considers the following variables: 

  • Vulnerability Properties: CVE, disclosure date, access mechanism and privileges needed.
  • Target Environment Setup: OS, application prevalence, version and special configurations needed.
  • Value Provided to Core Impact: Customer request, usage in multiple attacks, allows the installation of an agent, etc.
  • Technical Cost vs. Benefit: An analysis weighing the resources needed to build an exploit with the internal and external knowledge gained in its creation. 

Each one of these variables has a different weight and provides a ranking of the potential exploits to be developed. Following those criteria, the top of the list would contain, for example, a vulnerability on Windows (most popular OS) that can be exploited remotely, without authentication and that provides super user privileges. 

Correspondingly, a vulnerability on an application that is rarely installed, needs special configurations, and requires User Interaction, would be at the bottom.

Stay Informed of New Core Certified Exploits

Subscribe to receive regular email updates on new exploits available for Core Impact

Browse the Core Certified Exploit Library

We provide pen testers with real-time updates for a wide range of exploits for different platforms, operating systems, and applications. 

Search our continuously growing library to discover an exploit that will allow you to gain and retain access on the target host or application.

Title Description Date Added CVE Link Exploit Platform Exploit Type Product Name
RemoteExec REC File Buffer Overflow Exploit A malformed REC file allows an attacker to execute arbitrary code. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it. Windows Exploits / Client Side Impact
Rosoft Media Player M3U Buffer Overflow Exploit The vulnerability is caused due to boundary errors in Rosoft Media Player within the processing of M3U files. Rosoft Media Player fails to check the length of the string in M3U playlist archives, allowing an attacker to cause a stack overflow in order to execute arbitrary code. Windows Exploits / Client Side Impact
Safari File Policy Exploit A policy issue existed in Apple Safari before 5.1 when handling of file:// URLs. This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability. Mac OS X Exploits / Client Side Impact
Safari Webkit SVG Memory Corruption Exploit Webkit, as used in Apple Safari before 5.06 is prone to a memory corruption vulnerability caused by a web site with a crafted SVG graphic. This allows remote attackers to execute arbitrary code. This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability. Windows Exploits / Client Side Impact
SafeNet SoftRemote Policy File Buffer Overflow Exploit A malformed .SPD document allows an attacker to execute arbitrary code. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it. Windows Exploits / Client Side Impact
Samsung iPOLiS Device Manager XnsSdkDeviceIpInstaller DeleteDeviceProfile Method Stack Buffer Overflow Exploit By providing a malicious value when handling l DeleteDeviceProfile method, an attacker may be control the execution flow on the target. The attacker may then execute code on the target device remotely. This module runs a web server waiting for vulnerable clients (Internet Explorer 6, 7, 8) to connect to it. Windows Exploits / Client Side Impact
SAP AG SAPgui EAI WebViewer3D Buffer Overflow Exploit This module exploits a stack overflow in Siemens Unigraphics Solutions Teamcenter Visualization EAI WebViewer3D ActiveX control that is bundled with SAPgui. When passing an overly long string the SaveViewToSessionFile() method, arbitrary code may be executed.This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. Windows Exploits / Client Side Impact
ScadaTEC ModbusTagServer ZIP Buffer Overflow Exploit This module exploits a vulnerability in ScadaTEC ModbusTagServer. The vulnerability is caused due to boundary error within the processing of .ZIP project files. This can be exploited to cause a stack-based buffer overflow when a specially crafted .ZIP file is opened. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. Windows Exploits / Client Side Impact
ScadaTEC ScadaPhone ZIP Buffer Overflow Exploit This module exploits a vulnerability in ScadaTEC ScadaPhone. The vulnerability is caused due to boundary error within the processing of .ZIP project files. This can be exploited to cause a stack-based buffer overflow when a specially crafted .ZIP file is opened. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. Windows Exploits / Client Side Impact
SCADA Engine BACnet OPC Client Buffer Overflow Exploit SCADA Engine BACnet OPC Client is prone to a buffer-overflow vulnerability that occurs because it fails to perform adequate boundary checks on user-supplied data via a crafted .CSV document. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it. Windows Exploits / Client Side Impact
Schneider Electric Multiple Products DTM libraries Buffer Overflow Exploit The vulnerability exists within the isObjectModel ActiveX control's RemoveParameter property. This module runs a web server waiting for vulnerable clients (Internet Explorer 6, 7, 8, 9) to connect to it. Windows Exploits / Client Side Impact
Schneider Electric OFS Client Buffer Overflow Exploit A stack-based buffer overflow in Schneider Electric OFS Client allows an attacker to execute arbitrary code via a crafted .TXT configuration file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it. Windows Exploits / Client Side Impact
Schneider Electric ProClima MetaDraw ObjLinks Property Exploit The vulnerability exists within the MetaDraw ActiveX control's ObjLinks property. This module runs a web server waiting for vulnerable clients (Internet Explorer 6, 7, 8, 9) to connect to it. Windows Exploits / Client Side Impact
Schneider Electric VAMPSET ASCII Argument Heap Overflow Exploit The vulnerability is caused due to a boundary error within the parsing of disturbance .CFG and .DAT files, This can be exploited to cause a heap-based buffer overflow via a .CFG file with an overly long ASCII argument. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it. Windows Exploits / Client Side Impact
Schneider Electric VAMPSET Channel List Buffer Overflow Exploit The vulnerability is caused due to a boundary error within the parsing of disturbance .CFG and .DAT files, This can be exploited to cause a stack-based buffer overflow via a .CFG file with an overly long file string and clicking in Channel list window. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it. Windows Exploits / Client Side Impact
SDP Downloader ASX Buffer Overflow Exploit SDP Downloader contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in SDP Downloader when handling crafted .ASX files. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it. Windows Exploits / Client Side Impact
SecureCRT Exploit Proxy Exploits a vulnerability in the SecureCRT SSH client. The vulnerability is a stack buffer overflow that occurs when parsing the SSH protocol identifier string returned by the server. This exploit proxies TCP connections to a remote (or local) SSH server and monitors the SSH version string of connecting clients. Since the exploit needs to be performed before the client sends it's version string this module only records the IP address of vulnerable clients the first time that they connect. Windows Exploits / Client Side Impact
Serenity Audio Player Buffer Overflow Exploit Serenity Audio Player contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in Serenity Audio Player when handling .M3U files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .M3U file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it. Windows Exploits / Client Side Impact
Shadow Stream Recorder Buffer Overflow Exploit Shadow Stream Recorder is prone to a remote stack-based buffer-overflow vulnerability because the applications fail to perform adequate boundary checks on user-supplied input. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it. Windows Exploits / Client Side Impact
Siemens SIMATIC WinCC SCADA RegReader ActiveX Buffer Overflow Exploit Siemens WinCC contains an overflow condition in the RegReader ActiveX control. The issue is triggered as user-supplied input is not properly validated during the handling of a malformed website that calls the aforementioned ActiveX control. This may allow a context-dependent attacker to cause a buffer overflow and allowing the execution of arbitrary code. This module runs a web server waiting for vulnerable clients (Internet Explorer 6 and 7 ) in Windows XP to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability. Windows Exploits / Client Side Impact
SIEMENS Solid Edge SEListCtrlX ActiveX Memory Write Exploit Siemens Solid Edge SEListCtrlX ActiveX control is prone to an arbritrary memory write vulnerability because the application fails to perform adequate boundary checks on user-supplied data. This module runs a web server waiting for vulnerable clients (Internet Explorer 7) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability. Windows Exploits / Client Side Impact
Silo wintab32 DLL Hijacking Exploit Silo is prone to a vulnerability that may allow the execution of any library file named wintab32.dll, if this dll is located in the same folder than a .SIB file. The attacker must entice a victim into opening a specially crafted .SIB file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code. Windows Exploits / Client Side Impact
SiSoftware Sandra dwmapi DLL Hijacking Exploit SiSoftware Sandra is prone to a vulnerability that may allow the execution of any library file named dwmapi.dll, if this dll is located in the same folder than a .SIS file. The attacker must entice a victim into opening a specially crafted .SIS file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code. Windows Exploits / Client Side Impact
Sketchup MAC Pict Material Palette Stack Corruption Exploit Sketchup fails to validate the input when parsing an embedded MAC Pict texture, leading to an arbitrary stack offset overwrite and finally to an arbitrary code execution. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it. Windows Exploits / Client Side Impact
Skype Extras Manager ActiveX Exploit This module exploits a buffer overflow vulnerability in the Extras Manager ActiveX Control included in Skype. This bug is currently being exploited in the wild. This module runs a web server waiting for vulnerable clients (Internet Explorer 6 or 7) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability. Windows Exploits / Client Side Impact