• Close
  • Exploit Database

    The Rapid7 Exploit Database is an archive of Metasploit modules for publicly known exploits, 0days, remote exploits, shellcode, and more for researches and penetration testers to review. 3,000 plus modules are all available with relevant links to other technical documentation and source code. All of the modules included in the Exploit Database are also included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro.

    Displaying module details 1 - 10 of 3238 in total

    Drupal RESTWS Module Remote PHP Code Execution Exploit

    Disclosed: July 13, 2016

    This module exploits a Remote PHP Code Execution vulnerability in Drupal RESTWS Module. Unauthenticated users can execute arbitrary code under the context of the web server user. RESTWS alters the default page callbacks for entities to provide additional functionality. A vulnerability in this approach allows ...

    Tiki Wiki Unauthenticated File Upload Vulnerability Exploit

    Disclosed: July 11, 2016

    This module exploits a file upload vulnerability in Tiki Wiki <= 15.1 which could be abused to allow unauthenticated users to execute arbitrary code under the context of the web server user. The issue comes with one of the 3rd party components. Name of that components is ELFinder -version 2.0-. This components co...

    WebNMS Framework Server Credential Disclosure Exploit

    Disclosed: July 04, 2016

    This module abuses two vulnerabilities in WebNMS Framework Server 5.2 to extract all user credentials. The first vulnerability is a unauthenticated file download in the FetchFile servlet, which is used to download the file containing the user credentials. The second vulnerability is that the the passwords in the file are obfuscated with a very w...

    WebNMS Framework Server Arbitrary Text File Download Exploit

    Disclosed: July 04, 2016

    This module abuses a vulnerability in WebNMS Framework Server 5.2 that allows an unauthenticated user to download files off the file system by using a directory traversal attack on the FetchFile servlet. Note that only text files can be downloaded properly, as any binary file will get mangled by the servlet. Also note that for Windows targets yo...

    Riverbed SteelCentral NetProfiler/NetExpress Remote Code Execution Exploit

    Disclosed: June 27, 2016

    This module exploits three separate vulnerabilities found in the Riverbed SteelCentral NetProfiler/NetExpress virtual appliances to obtain remote command execution as the root user. A SQL injection in the login form can be exploited to add a malicious user into the application's database. An attacker can then exploit a co...

    JSON Swagger CodeGen Parameter Injector Exploit

    Disclosed: June 23, 2016

    This module generates a Open API Specification 2.0 (Swagger) compliant json document that includes payload insertion points in parameters. In order for the payload to be executed, an attacker must convince someone to generate code from a specially modified swagger.json file within a vulnerable swagger-codgen appl...

    NetBIOS Response "BadTunnel" Brute Force Spoof (NAT Tunnel) Exploit

    Disclosed: June 14, 2016

    This module listens for a NetBIOS name request and then continuously spams NetBIOS responses to a target for given hostname, causing the target to cache a malicious address for this name. On high-speed networks, the PPSRATE value should be increased to speed up this attack. As an example, a value of around 30,000 ...

    ClamAV Remote Command Transmitter Exploit

    Disclosed: June 08, 2016

    In certain configurations, ClamAV will bind to all addresses and listen for commands. This module sends properly-formatted commands to the ClamAV daemon if it is in such a configuration.

    Tiki-Wiki CMS Calendar Command Execution Exploit

    Disclosed: June 06, 2016

    Tiki-Wiki CMS's calendar module contains a remote code execution vulnerability within the viewmode GET parameter. The calendar module is NOT enabled by default. If enabled, the default permissions are set to NOT allow anonymous users to access. Vulnerable versions: <=14.1, <=12.4 LTS, <=9.10 LT...

    Poison Ivy 2.1.x C2 Buffer Overflow Exploit

    Disclosed: June 03, 2016

    This module exploits a stack buffer overflow in the Poison Ivy 2.1.x C&C server. The exploit does not need to know the password chosen for the bot/server communication.