• Close
  • Exploit Database

    The Rapid7 Exploit Database is an archive of Metasploit modules for publicly known exploits, 0days, remote exploits, shellcode, and more for researches and penetration testers to review. 3,000 plus modules are all available with relevant links to other technical documentation and source code. All of the modules included in the Exploit Database are also included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro.

    Displaying module details 1 - 10 of 3277 in total

    Ruby on Rails Dynamic Render File Upload Remote Code Execution Exploit

    Disclosed: October 16, 2016

    This module exploits a remote code execution vulnerability in the explicit render method when leveraging user parameters. This module has been tested across multiple versions of Ruby on Rails. The technique used by this module requires the specified endpoint to be using dynamic render paths, such as the following ...

    HTA Web Server Exploit

    Disclosed: October 06, 2016

    This module hosts an HTML Application (HTA) that when opened will run a payload via Powershell. When a user navigates to the HTA file they will be prompted by IE twice before the payload is executed.

    Cisco IKE Information Disclosure Exploit

    Disclosed: September 29, 2016

    A vulnerability in Internet Key Exchange version 1 (IKEv1) packet processing code in Cisco IOS, Cisco IOS XE, and Cisco IOS XR Software could allow an unauthenticated, remote attacker to retrieve memory contents, which could lead to the disclosure of confidential information. The vulnerability is due to insuffici...

    Metasploit Web UI Static secret_key_base Value Exploit

    Disclosed: September 15, 2016

    This module exploits the Web UI for Metasploit Community, Express and Pro where one of a certain set of Weekly Releases have been applied. These Weekly Releases introduced a static secret_key_base value. Knowledge of the static secret_key_base value allows for deserialization of a crafted Ruby Object, achieving co...

    Metasploit Web UI Diagnostic Console Command Execution Exploit

    Disclosed: August 23, 2016

    This module exploits the "diagnostic console" feature in the Metasploit Web UI to obtain a reverse shell. The diagnostic console is able to be enabled or disabled by an administrator on Metasploit Pro and by an authenticated user on Metasploit Express and Metasploit Community. When enabled, the diagnostic...

    ColoradoFTP Server 1.3 Build 8 Directory Traversal Information Disclosure Exploit

    Disclosed: August 11, 2016

    This module exploits a directory traversal vulnerability found in ColoradoFTP server version <= 1.3 Build 8. This vulnerability allows an attacker to download and upload arbitrary files from the server GET/PUT command including file system traversal strings starting with '\\'. The server is writen in Java and therefore pl...

    Zabbix toggle_ids SQL Injection Exploit

    Disclosed: August 11, 2016

    This module will exploit a SQL injection in Zabbix 3.0.3 and likely prior in order to save the current usernames and password hashes from the database to a JSON file.

    Internet Explorer Iframe Sandbox File Name Disclosure Vulnerability Exploit

    Disclosed: August 09, 2016

    It was found that Internet Explorer allows the disclosure of local file names. This issue exists due to the fact that Internet Explorer behaves different for file:// URLs pointing to existing and non-existent files. When used in combination with HTML5 sandbox iframes it is possible to use this behavior to find out...

    DLL Side Loading Vulnerability in VMware Host Guest Client Redirector Exploit

    Disclosed: August 05, 2016

    A DLL side loading vulnerability was found in the VMware Host Guest Client Redirector, a component of VMware Tools. This issue can be exploited by luring a victim into opening a document from the attacker's share. An attacker can exploit this issue to execute arbitrary code with the privileges of the target user. This can poten...

    Samsung Security Manager 1.4 ActiveMQ Broker Service PUT Method Remote Code Execution Exploit

    Disclosed: August 05, 2016

    This is an exploit against Samsung Security Manager that bypasses the patch in ZDI-15-156 & ZDI-16-481 by exploiting the vulnerability against the client-side. This exploit has been tested successfully using IE, FireFox and Chrome by abusing a GET request XSS to bypass CORS and reach the vulnerable PUT. Finally a traversa...