Core Certified Exploits

We provide real-time updates including new penetration testing exploits and tests for additional platforms as they become available. We advise you of any new modules by email, after which you can download them directly from within Core Impact. All product updates are free during the license period. You're always on the cutting edge of vulnerability and threat intelligence because Core Impact keeps you there.

Subscribe to receive regular updates by email:

 

Browse All Exploits

 

 

Title Description CVE Link Exploit Platform Exploit Type
NVIDIA DxgDdiEscape Handler Privilege Escalation Exploit Update NVIDIA Windows GPU Display Driver R340 before 342.00 and R375 before 375.63 contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape ID 0x600000D where a value passed from a user to the driver is used without validation leading to escalation of privileges. This update add reliability and speed to the attack. Windows Exploits/Local
Trend Micro Mobile Security for Enterprise upload_img_file Arbitrary File Upload Vulnerability Exploit This module exploits an arbitrary file upload in Trend Micro Mobile Security for Enterprise to install an agent. Windows Exploits/Remote File Inclusion/Known Vulnerabilities
Microsoft Office Memory Corruption Exploit (CVE-2017-11826) A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. Windows Exploits/Client Side
WECON LeviStudio HMI Editor Buffer Overflow Exploit Multiple stack-based buffer overflow vulnerabilities have been identified in which the application does not verify string size before copying to memory, the attacker may then be able to crash the application or run arbitrary code. Windows Exploits/Client Side
CyberGhost CG6Service Service SetPeLauncherState Vulnerability Local Privilege Escalation Exploit Update The CG6Service Service in CyberGhost has the SetPeLauncherState method which allows a user to launch a debugger automatically for a determined process. This can be abused by an attacker to gain SYSTEM privileges by attaching to a SYSTEM process. This update fixes a minor bug. Windows Exploits/Local
Adobe ColdFusion Java JMX-RMI Remote Code Execution Exploit Adobe ColdFusion is prone to a remote vulnerability that allows attackers to take advantage of an insecure deployment of the JMX/RMI service used to manage and monitor the Java Virtual Machine. Windows Exploits/Remote
VX Search Enterprise POST Buffer Overflow Exploit VX Search Enterprise is prone to a buffer overflow via an empty POST request to a long URI beginning with a /../ substring. Windows Exploits/Remote
Lepide Auditor Suite createdb Web Console Database Injection Remote Code Execution Vulnerability Exploit The application allows an attacker to specify a server to perform authentication. That server also allows to execute controlled SQL directly against the database. This module abuses of the previous vulnerabilities in order execute an agent as SYSTEM. Windows Exploits/Remote
EFS Chat Server POST Buffer Overflow Exploit Username parameter in Registeration page 'register.ghp' is prone to a stack-based buffer-overflow vulnerability. Application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Windows Exploits/Remote
Jungo DriverWizard WinDriver Kernel Out-of-Bounds Write Privilege Escalation Exploit This vulnerability allows local attackers to escalate privileges on vulnerable installations of Jungo WinDriver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the processing of IOCTL 0x953824a7 by the windrvr12xx kernel driver. The issue lies in the failure to properly validate user-supplied data which can result in an out-of-bounds write condition. An attacker can leverage this vulnerability to execute arbitrary code under the context of kernel. Windows Exploits/Local
Apache Tomcat readonly Initialisation Parameter JSP Remote Code Execution Exploit Apache Tomcat allows the upload of JSP files to unauthenticated users via a specially crafted request when the readonly initialization parameter of the Default servlet is set to false. Linux Exploits/Remote
SyncBreeze POST Username Buffer Overflow Exploit The vulnerability is a buffer overlow when parsing a POST command with a crafted username. Windows Exploits/Remote
ATutor AContent ims_import.php Zip File Upload Directory Traversal PHP Remote Code Execution Exploit This module exploits a zip file upload directory traversal in ATutor AContent to install an agent. Exploits/Remote File Inclusion/Known Vulnerabilities
PCMan FTP Server USER Command Buffer Overflow Exploit Update PCMan's FTP Server is prone to a buffer-overflow when handling an overly long USER command. This update improves the exploit reliability. Windows Exploits/Remote
Exploit fixes This update fixes several non related issues in the exploit component. Linux Exploits/Remote
Microsoft NET Framework SOAP WSDL Parser Code Injection CVE-2017-8759 A vulnerability exists in Microsoft .NET. A specially crafted RTF document or application can trigger an input validation flaw and execute arbitrary code on the target user's system. Windows Exploits/Client Side
Schneider Electric U.motion Builder file_picker.php Directory Traversal Arbitrary File Upload Remote Code Execution Exploit This module exploits a directory traversal arbitrary file upload in Schneider Electric U.Motion Builder to install an agent. Exploits/Remote File Inclusion/Known Vulnerabilities
MS17-010 Detector update This update fixes an issue handling the report of the vulnerability. Windows Exploits/Remote
Apache Struts 2 REST Plugin XStream Exploit This module exploits a Java deserialization bug in Apache Struts REST XStreamHandler which allows users to get Code Execution. Linux Exploits/OS Command Injection/Known Vulnerabilities
Delta Industrial Automation WPLSoft File Parsing Buffer Overflow Exploit The specific flaw exists within the processing of DVP files. The process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. Windows Exploits/Client Side
Fuji Electric Monitouch V-SFT Project File Buffer Overflow Exploit The specific flaw exists within parsing of a V8 project file. The issue lies in the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. Windows Exploits/Client Side
OrientDB Remote Command Execution Exploit This module exploits a privilege escalation vulnerability in OrientDB by abusing SQL queries on OUser/ORole without the privileges which allows users to get Code Execution. Linux Exploits/OS Command Injection/Known Vulnerabilities
RAT Gh0st Controller Server Buffer Overflow Exploit This module exploits a buffer overflow in the Gh0st Controller Server when handling a drive list. Windows Exploits/Remote
Eaton ELCSoft EPC File Buffer Overflow Exploit The specific flaw exists within processing of EPC files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. Windows Exploits/Client Side
Advantech WebAccess nvA1Media Caption Heap-based Buffer Overflow Remote Code Execution Exploit The specific flaw exists within nvA1Media.ocx. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute arbitrary code under the context of the process. Windows Exploits/Client Side