Core Certified Exploits

Library of expert validated exploits for safe and effective pen tests

Browse the Core Certified Exploit Library  

 

Exploit development can be an advanced penetration testing skill that takes time to master. Additionally, when on a job, pen testers often don’t have the resources to create a new exploit. Many resort to searching for and using pre-written exploits that have not been tested and must go through the timely effort of quality assurance testing in order to ensure they are secure and effective.

Core Impact users can save time by finding all the up-to-date exploits they need in one place. We provide a robust library of exploits designed to enable pen testers to safely and efficiently conduct successful penetration tests. Whether written by our own internal team or by a third party like ExCraft, you can trust they have been thoroughly tested and validated by our experts.

The universe of vulnerabilities is huge and not all of them represent the same risk for the customers. Vulnerabilities do not all have the same level of criticality. Some may be easily exploitable by a low-level user, while others may not be exploitable at all. To increase the efficiency of the attacks and the quality of the exploits provided, the Core Impact team has developed selection criteria to prioritize its analysis and implementation. We determine which exploits warrant creation based on the following questions:

  • What are the most critical attacks from the attacker’s perspective?
  • What new vulnerabilities are more likely to be exploited in real attacks?
  • What exploits are the most valuable for Core Impact?

Once an exploit is approved, its priority order considers the following variables: 

  • Vulnerability Properties: CVE, disclosure date, access mechanism and privileges needed. 
  • Target Environment Setup: OS, application prevalence, version and special configurations needed. 
  • Value Provided to Core Impact: Customer request, usage in multiple attacks, allows the installation of an agent, etc. 
  • Technical Cost vs. Benefit: An analysis weighing the resources needed to build an exploit with the internal and external knowledge gained in its creation. 

Each one of these variables has a different weight and provides a ranking of the potential exploits to be developed. Following those criteria, the top of the list would contain, for example, a vulnerability on Windows (most popular OS) that can be exploited remotely, without authentication and that provides super user privileges. 

Correspondingly, a vulnerability on an application that is rarely installed, needs special configurations, and requires User Interaction, would be at the bottom.

Stay Informed of New Core Certified Exploits

Subscribe to receive regular email updates on new exploits available for Core Impact

Browse the Core Certified Exploit Library

We provide pen testers with real-time updates for a wide range of exploits for different platforms, operating systems, and applications. 

Search our continuously growing library to discover an exploit that will allow you to gain and retain access on the target host or application.

Title Description Date Added CVE Link Exploit Platform Exploit Type Product Name
Microsoft Windows Common Log File System Driver Elevation of Privilege Vulnerability Exploit (CVE-2024-38196) The Common Log File System Driver (clfs.sys) present in Microsoft Windows is vulnerable to a memory corruption vulnerability. This module allows a local unprivileged user to execute arbitrary code with SYSTEM privileges by creating a specially crafted base log file. Windows Exploits / Local Impact
Windows Common Log File System Driver LoadContainerQ Elevation of Privilege Vulnerability Exploit This module exploits a vulnerability in the LoadContainerQ function within clfs.sys. The root cause of this vulnerability is that LoadContainerQ uses CLFS_CONTAINER_CONTEXT.pContainer without verifying whether the FlushImage function has invalidated the General Metadata Block. Windows Exploits / Local Impact
Microsoft Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability Exploit (CVE-2024-38144) An elevation of privilege vulnerability exists due to the MS KS WOW Thunk kernel module allowing an integer overflow which can lead into a buffer overflow. The vulnerability could allow an attacker to run code with elevated privileges. Windows Exploits / Local Impact
Assorted Improvements for Exploits Enhance identity management in exploits. * Linked created identities in the Module Output: Added a reference to the created identity in the Module Output. * Added Validated and Validated in properties to identities: Ensured that created identities include Validated=True and are associated with the target (Validated in) where they were verified. Linux, Windows Exploits / Remote Code Execution Impact
Microsoft Windows Ancillary Function Driver UAF Privilege Excalation Exploit (CVE-2024-38193) A critical use-after-free vulnerability in the Windows Ancillary Function Driver (afd.sys), allows attackers to escalate privileges. It stems from a race condition in the Registered I/O (RIO) extension for Windows sockets, between the functions AfdRioGetAndCacheBuffer() and AfdRioDereferenceBuffer(). Windows Exploits / Local Impact
Ivanti Connect Secure IFT_PREAUTH_INIT clientCapabilities Buffer Overflow Remote Code Execution Exploit Ivanti Connect Secure contains a stack-based buffer overflow that allows unauthenticated remote attackers to execute system commands in the context of the nr user. Linux Exploits / Remote Code Execution Impact
Microsoft Office Spoofing NTLMv2 Disclosure Vulnerability Exploit The vulnerability exploits Office URI schemes to redirect HTTP requests to UNC paths using redirection. This enables attackers to bypass URI restrictions and capture NTLMv2 hashes. Windows Exploits / Client Side Impact
Cacti Cmd Realtime Remote Code Execution Exploit This issue allows unauthenticated users to execute arbitrary commands on the server due to a command injection vulnerability in the `cmd_realtime.php` file. The vulnerability arises when the `register_argc_argv` option of PHP is enabled, which is the default setting in many environments. The `$poller_id` used in command execution is sourced from `$_SERVER['argv']`, which can be manipulated through URLs when this option is enabled. This module exploits this vulnerability sending a special request to 'cmd_realtime.php' that sets $_SERVER['argv'] into an os command. Windows Exploits / OS Command Injection / Known Vulnerabilities Impact
F5 BIG-IP Next Central Manager SQL Injection Vulnerability Exploit An SQL injection vulnerability in F5 BIG-IP Next Central Manager may allow unauthenticated remote attackers to bypass authentication in the target application. Linux Exploits / Remote Impact
Longjing Technology Battery Energy Management System API Remote Arbitrary File Download Longjing Technology Battery Energy Management System (BEMS) Directory Traversal Exploits / Remote File Disclosure SCADA
D-Link NAS Command Injection Vulnerability The vulnerability is localized to the account_mgr.cgi script, particularly in the handling of the cgi_user_add command. The name parameter in this script does not adequately sanitize input, allowing for command execution. Exploits / Remote IOT
Tinycontrol LAN Controller v3 Reset Factory Settings Remote Denial Tinycontrol LAN Controller Windows Denial of Service / Remote SCADA
Nagios XI monitoringwizard SQL Injection vulnerability Exploit The CVE-2024-24401 vulnerability in Nagios XI version 2024R1.01 allows a remote attacker to execute arbitrary code through an SQL injection in the monitoringwizard.php component. Successful exploitation of this vulnerability can compromise the confidentiality, integrity, and availability of the affected system. The CVE-2024-24402 vulnerability affects Nagios XI version 2024R1.01, enabling a remote attacker to escalate privileges via a crafted script targeting the /usr/local/nagios/bin/npcd component. Linux Exploits / Remote Code Execution Impact
Palo Alto Networks OS (PAN-OS) Remote Code Execution Exploit Update This update improves the module description and messages in the Module Output panel. Exploits / OS Command Injection / Known Vulnerabilities Impact
Korenix JetPort 5601 Serial Device Server path traversal This module exploits a directory traversal vulnerability in Korenix JetPort 5601 Serial Device Server Windows Exploits / Remote IOT
Fuji Electric V-Server Unauthenticated Remote Denial of Service This modules causes a Denial of Service in Fuji Electric V-Server Linux Denial of Service / Remote SCADA
Comtrend CT 5361T Password Disclosure Comtrend router CT 5361T Password Disclosure Exploits / Client Side IOT
Hitachi Energy PROMOD IV delete arbitrary files This module will receive HTTP requests from vulnerable clients and install agents on them. Exploits / Client Side SCADA
Microsoft Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability Exploit (CVE-2024-30090) An elevation of privilege vulnerability exists due to the MS KS WOW Thunk kernel module allowing untrusted pointer dereference. The vulnerability could allow an attacker to run code with elevated privileges. Windows Exploits / Local Impact
Microsoft Windows Event Logging Service DoS Update This update adds reliability improvements to check if the target is vulnerable. Windows Denial of Service / Remote Impact
Progress OpenEdge authorizeUser Authentication Bypass Vulnerability Checker An authentication bypass vulnerability in Progress OpenEdge allows unauthenticated remote attackers to authenticate in the target application as NT AUTHORITY/SYSTEM. Windows Information gathering / Vulnerability checkers Impact
Palo Alto Networks OS (PAN-OS) Remote Code Execution Exploit An authentication bypass in Palo Alto Networks PAN-OS software(CVE-2024-0012) enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions. A privilege escalation vulnerability in Palo Alto Networks PAN-OS software(CVE-2024-9474) allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. This module exploits these two vulnerabilities CVE-2024-0012 and CVE-2024-9474 in order to deploy an agent. Exploits / OS Command Injection / Known Vulnerabilities Impact
Palo Alto Networks Expedition Remote Code Execution Exploit This module exploits CVE-2024-5910 to reset the password of the admin. For doing this, it will craft a special request to the endpoint /OS/startup/restore/restoreAdmin.php. After getting the admin password, it will authenticate with the admin credentials and it will exploit CVE-2024-9464 in order to deploy an agent. The exploitation of CVE-2024-9464 consists in crafting a special request to the endpoint /bin/CronJobs.php. As an authenticated user we can abuse this endpoint for inserting commands in the table cronjobs from pandb. Linux Exploits / OS Command Injection / Known Vulnerabilities Impact
Windows Ks Driver KSPROPERTY Privilege Escalation Exploit A vulnerability in Kernel Streaming (ks.sys driver) allows arbitrary IOCTL_KS_PROPERTY operations. A double fetch vulnerability in KspPropertyHandler, can be used to gain system privileges. Windows Exploits / Local Impact
NextGen Healthcare Mirth Connect Deserialization Remote Code Execution Exploit CVE-2023-43208 stems from an insecure data deserialization process in Mirth Connect's use of the XStream library, which improperly processes untrusted XML payloads.This deserialization flaw enables us to exploit the system by sending crafted XML requests to execute code remotely on the server. Windows, Linux Exploits / Remote Code Execution Impact