Exploit Database

The Rapid7 Exploit Database is an archive of Metasploit modules for publicly known exploits, 0days, remote exploits, shellcode, and more for researches and penetration testers to review. 3,000 plus modules are all available with relevant links to other technical documentation and source code. All of the modules included in the Exploit Database are also included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro.


Displaying module details 251 - 260 of 3643 in total

IBM WebSphere RCE Java Deserialization Vulnerability Exploit

Disclosed: November 06, 2015

This module exploits a vulnerability in IBM's WebSphere Application Server. An unsafe deserialization call of unauthenticated Java objects exists to the Apache Commons Collections (ACC) library, which allows remote arbitrary code execution. Authentication is not required in order to exploit this vulnerability.

vBulletin 5.1.2 Unserialize Code Execution Exploit

Disclosed: November 04, 2015

This module exploits a PHP object injection vulnerability in vBulletin 5.1.2 to 5.1.9

Atlassian HipChat for Jira Plugin Velocity Template Injection Exploit

Disclosed: October 28, 2015

Atlassian Hipchat is a web service for internal instant messaging. A plugin is available for Jira that allows team collaboration at real time. A message can be used to inject Java code into a Velocity template, and gain code execution as Jira. Authentication is required to exploit this vulnerability, and you must make sur...

China Chopper Caidao PHP Backdoor Code Execution Exploit

Disclosed: October 27, 2015

This module takes advantage of the China Chopper Webshell that is commonly used by Chinese hackers.

Joomla Content History SQLi Remote Code Execution Exploit

Disclosed: October 23, 2015

This module exploits a SQL injection vulnerability found in Joomla versions 3.2 up to 3.4.4. The vulnerability exists in the Content History administrator component in the core of Joomla. Triggering the SQL injection makes it possible to retrieve active Super User sessions. The cookie can be used to login to the J...

Joomla Real Estate Manager Component Error-Based SQL Injection Exploit

Disclosed: October 22, 2015

This module exploits a SQL injection vulnerability in Joomla Plugin com_realestatemanager versions 3.7 in order to either enumerate usernames and password hashes.

Joomla com_contenthistory Error-Based SQL Injection Exploit

Disclosed: October 22, 2015

This module exploits a SQL injection vulnerability in Joomla versions 3.2 through 3.4.4 in order to either enumerate usernames and password hashes.

Safari User-Assisted Applescript Exec Attack Exploit

Disclosed: October 16, 2015

In versions of Mac OS X before 10.11.1, the applescript:// URL scheme is provided, which opens the provided script in the Applescript Editor. Pressing cmd-R in the Editor executes the code without any additional confirmation from the user. By getting the user to press cmd-R in Safari, and by hooking the cmd-key ke...

Limesurvey Unauthenticated File Download Exploit

Disclosed: October 12, 2015

This module exploits an unauthenticated file download vulnerability in limesurvey between 2.0+ and 2.06+ Build 151014. The file is downloaded as a ZIP and unzipped automatically, thus binary files can be downloaded.

Wordpress Ajax Load More PHP Upload Vulnerability Exploit

Disclosed: October 10, 2015

This module exploits an arbitrary file upload in the WordPress Ajax Load More version 2.8.1.1. It allows to upload arbitrary php files and get remote code execution. This module has been tested successfully on WordPress Ajax Load More 2.8.0 with Wordpress 4.1.3 on Ubuntu 12.04/14.04 Server.