Exploit Database

The Rapid7 Exploit Database is an archive of Metasploit modules for publicly known exploits, 0days, remote exploits, shellcode, and more for researches and penetration testers to review. 3,000 plus modules are all available with relevant links to other technical documentation and source code. All of the modules included in the Exploit Database are also included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro.


Displaying module details 1 - 10 of 3570 in total

Cambium ePMP1000 'get_chart' Shell via Command Injection (v3.1-3.5-RC7) Exploit

Disclosed: December 18, 2017

This module exploits an OS Command Injection vulnerability in Cambium ePMP1000 device management portal. It requires any one of the following login credentials - admin/admin, installer/installer, home/home - to set up a reverse netcat shell. The module has been tested on versions 3.1-3.5-RC7.

Linksys WVBR0-25 User-Agent Command Execution Exploit

Disclosed: December 13, 2017

The Linksys WVBR0-25 Wireless Video Bridge, used by DirecTV to connect wireless Genie cable boxes to the Genie DVR, is vulnerable to OS command injection in version < 1.0.41 of the web management portal via the User-Agent header. Authentication is not required to exploit this vulnerability.

Commvault Communications Service (cvd) Command Injection Exploit

Disclosed: December 12, 2017

This module exploits a command injection vulnerability discovered in Commvault Service v11 SP5 and earlier versions (tested in v11 SP5 and v10). The vulnerability exists in the cvd.exe service and allows an attacker to execute arbitrary commands in the context of the service. By default, the Commvault Communicatio...

Mac OS X Root Privilege Escalation Exploit

Disclosed: November 29, 2017

This module exploits a serious flaw in MacOSX High Sierra. Any user can login with user "root", leaving an empty password.

Clickjacking Vulnerability In CSRF Error Page pfSense Exploit

Disclosed: November 21, 2017

This module exploits a Clickjacking vulnerability in pfSense <= 2.4.1. pfSense is a free and open source firewall and router. It was found that the pfSense WebGUI is vulnerable to Clickjacking. By tricking an authenticated admin into interacting with a specially crafted webpage it is possible for an attacker ...

Microsoft Office CVE-2017-11882 Exploit

Disclosed: November 15, 2017

Module exploits a flaw in how the Equation Editor that allows an attacker to execute arbitrary code in RTF files without interaction. The vulnerability is caused by the Equation Editor, to which fails to properly handle OLE objects in memory.

Dup Scout Enterprise Login Buffer Overflow Exploit

Disclosed: November 14, 2017

This module exploits a stack buffer overflow in Dup Scout Enterprise 10.0.18. The buffer overflow exists via the web interface during login. This gives NT AUTHORITY\SYSTEM access.

Polycom Shell HDX Series Traceroute Command Execution Exploit

Disclosed: November 12, 2017

Within Polycom command shell, a command execution flaw exists in lan traceroute, one of the dev commands, which allows for an attacker to execute arbitrary payloads with telnet or openssl.

Samsung Internet Browser SOP Bypass Exploit

Disclosed: November 08, 2017

This module takes advantage of a Same-Origin Policy (SOP) bypass vulnerability in the Samsung Internet Browser, a popular mobile browser shipping with Samsung Android devices. By default, it initiates a redirect to a child tab, and rewrites the innerHTML to gather credentials via a fake pop-up.

pfSense authenticated group member RCE Exploit

Disclosed: November 06, 2017

pfSense, a free BSD based open source firewall distribution, version <= 2.3.1_1 contains a remote command execution vulnerability post authentication in the system_groupmanager.php page. Verified against 2.2.6 and 2.3.