Exploit Database

The Rapid7 Exploit Database is an archive of Metasploit modules for publicly known exploits, 0days, remote exploits, shellcode, and more for researches and penetration testers to review. 3,000 plus modules are all available with relevant links to other technical documentation and source code. All of the modules included in the Exploit Database are also included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro.


Displaying module details 261 - 270 of 3699 in total

Apache Karaf Default Credentials Command Execution Exploit

Disclosed: February 09, 2016

This module exploits a default misconfiguration flaw on Apache Karaf versions 2.x-4.x. The 'karaf' user has a known default password, which can be used to login to the SSH service, and execute operating system commands from remote.

Advantech WebAccess Dashboard Viewer uploadImageCommon Arbitrary File Upload Exploit

Disclosed: February 05, 2016

This module exploits an arbitrary file upload vulnerability found in Advantech WebAccess 8.0. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess. Authentication is not required to exploit this vulnerability. The specific flaw exists within the WebAc...

D-Link DSL-2750B OS Command Injection Exploit

Disclosed: February 05, 2016

This module exploits a remote command injection vulnerability in D-Link DSL-2750B devices. Vulnerability can be exploited through "cli" parameter that is directly used to invoke "ayecli" binary. Vulnerable firmwares are from 1.01 up to 1.03.

NETGEAR ProSafe Network Management System 300 Arbitrary File Upload Exploit

Disclosed: February 04, 2016

Netgear's ProSafe NMS300 is a network management utility that runs on Windows systems. The application has a file upload vulnerability that can be exploited by an unauthenticated remote attacker to execute code as the SYSTEM user. Two servlets are vulnerable, FileUploadController (located at /lib-1.0/external/flas...

NETGEAR ProSafe Network Management System 300 Authenticated File Download Exploit

Disclosed: February 04, 2016

Netgear's ProSafe NMS300 is a network management utility that runs on Windows systems. The application has a file download vulnerability that can be exploited by an authenticated remote attacker to download any file in the system. This module has been tested with versions 1.5.0.2, 1.4.0.17 and 1.1.0.13.

lastore-daemon D-Bus Privilege Escalation Exploit

Disclosed: February 02, 2016

This module attempts to gain root privileges on Deepin Linux systems by using lastore-daemon to install a package. The lastore-daemon D-Bus configuration on Deepin Linux 15.5 permits any user in the sudo group to install arbitrary system packages without providing a password, resulting in code execution as root. ...

Oracle ATS Arbitrary File Upload Exploit

Disclosed: January 20, 2016

This module exploits an authentication bypass and arbitrary file upload in Oracle Application Testing Suite (OATS), version 12.4.0.2.0 and unknown earlier versions, to upload and execute a JSP shell.

Fortinet SSH Backdoor Scanner Exploit

Disclosed: January 09, 2016

This module scans for the Fortinet SSH backdoor.

Android ADB Debug Server Remote Payload Execution Exploit

Disclosed: January 01, 2016

Writes and spawns a native payload on an android device that is listening for adb debug messages.

PostgreSQL CREATE LANGUAGE Execution Exploit

Disclosed: January 01, 2016

Some installations of Postgres 8 and 9 are configured to allow loading external scripting languages. Most commonly this is Perl and Python. When enabled, command execution is possible on the host. To execute system commands, loading the "untrusted" version of the language is necessary. This requires a superuser. This is u...