Exploit Database

The Rapid7 Exploit Database is an archive of Metasploit modules for publicly known exploits, 0days, remote exploits, shellcode, and more for researches and penetration testers to review. 3,000 plus modules are all available with relevant links to other technical documentation and source code. All of the modules included in the Exploit Database are also included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro.

Displaying module details 251 - 260 of 3743 in total

ActiveMQ web shell upload Exploit

Disclosed: June 01, 2016

The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.

Apache Struts REST Plugin With Dynamic Method Invocation Remote Code Execution Exploit

Disclosed: June 01, 2016

This module exploits a remote command execution vulnerability in Apache Struts version between 2.3.20 and 2.3.28 (except and Remote Code Execution can be performed when using REST Plugin with ! operator when Dynamic Method Invocation is enabled.

WordPress WP Mobile Detector 3.5 Shell Upload Exploit

Disclosed: May 31, 2016

WP Mobile Detector Plugin for WordPress contains a flaw that allows a remote attacker to execute arbitrary PHP code. This flaw exists because the /wp-content/plugins/wp-mobile-detector/resize.php script does contains a remote file include for files not cached by the system already. By uploading a .php file...

Magento 2.0.6 Unserialize Remote Code Execution Exploit

Disclosed: May 17, 2016

This module exploits a PHP object injection vulnerability in Magento 2.0.6 or prior.

Internet Explorer 11 VBScript Engine Memory Corruption Exploit

Disclosed: May 10, 2016

This module exploits the memory corruption vulnerability (CVE-2016-0189) present in the VBScript engine of Internet Explorer 11.

IPFire proxy.cgi RCE Exploit

Disclosed: May 04, 2016

IPFire, a free linux based open source firewall distribution, version < 2.19 Update Core 101 contains a remote command execution vulnerability in the proxy.cgi page.

Linux BPF Local Privilege Escalation Exploit

Disclosed: May 04, 2016

Linux kernel >=4.4 with CONFIG_BPF_SYSCALL and kernel.unprivileged_bpf_disabled sysctl is not set to 1, BPF can be abused to priv escalate. Ubuntu 16.04 has all of these conditions met.

WordPress Ninja Forms Unauthenticated File Upload Exploit

Disclosed: May 04, 2016

Versions 2.9.36 to 2.9.42 of the Ninja Forms plugin contain an unauthenticated file upload vulnerability, allowing guests to upload arbitrary PHP code that can be executed in the context of the web server.

ImageMagick Delegate Arbitrary Command Execution Exploit

Disclosed: May 03, 2016

This module exploits a shell command injection in the way "delegates" (commands for converting files) are processed in ImageMagick versions <= 7.0.1-0 and <= 6.9.3-9 (legacy). Since ImageMagick uses file magic to detect file format, you can create a .png (for example) which is actually a crafted SVG (for example)...

Allwinner 3.4 Legacy Kernel Local Privilege Escalation Exploit

Disclosed: April 30, 2016

This module attempts to exploit a debug backdoor privilege escalation in Allwinner SoC based devices. Vulnerable Allwinner SoC chips: H3, A83T or H8 which rely on Kernel 3.4 Vulnerable OS: all OS images available for Orange Pis, any for FriendlyARM's NanoPi M1, SinoV...