Exploit Database

The Rapid7 Exploit Database is an archive of Metasploit modules for publicly known exploits, 0days, remote exploits, shellcode, and more for researches and penetration testers to review. 3,000 plus modules are all available with relevant links to other technical documentation and source code. All of the modules included in the Exploit Database are also included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro.

Displaying module details 31 - 40 of 3432 in total

Piwik Superuser Plugin Upload Exploit

Disclosed: February 05, 2017

This module will generate a plugin, pack the payload into it and upload it to a server running Piwik. Superuser Credentials are required to run this module. This module does not work against Piwik 1 as there is no option to upload custom plugins. Piwik disabled custom plugin uploads in version 3.0.3. From ...

WordPress REST API Content Injection Exploit

Disclosed: February 01, 2017

This module exploits a content injection vulnerability in WordPress versions 4.7 and 4.7.1 via type juggling in the REST API.

AlienVault OSSIM/USM Remote Code Execution Exploit

Disclosed: January 31, 2017

This module exploits object injection, authentication bypass and ip spoofing vulnerabities all together. Unauthenticated users can execute arbitrary commands under the context of the root user. By abusing authentication bypass issue on gauge.php lead adversaries to exploit object injection vulnerability which leads to SQ...

QNAP NAS/NVR Administrator Hash Disclosure Exploit

Disclosed: January 31, 2017

This module exploits combined heap and stack buffer overflows for QNAP NAS and NVR devices to dump the admin (root) shadow hash from memory via an overwrite of __libc_argv[0] in the HTTP-header-bound glibc backtrace. A binary search is performed to find the correct offset for the BOFs. Since the server forks, bli...

Advantech WebAccess 8.1 Post Authentication Credential Collector Exploit

Disclosed: January 21, 2017

This module allows you to log into Advantech WebAccess 8.1, and collect all of the credentials. Although authentication is required, any level of user permission can exploit this vulnerability. Note that 8.2 is not suitable for this.

Cisco WebEx Chrome Extension RCE (CVE-2017-3823) Exploit

Disclosed: January 21, 2017

This module exploits a vulnerability present in the Cisco WebEx Chrome Extension version 1.0.1 which allows an attacker to execute arbitrary commands on a system.

Trend Micro InterScan Messaging Security (Virtual Appliance) Remote Code Execution Exploit

Disclosed: January 15, 2017

This module exploits a command injection vulnerability in the Trend Micro IMSVA product. An authenticated user can execute a terminal command under the context of the web server user which is root. Besides, default installation of IMSVA comes with a default administrator credentials. saveCert.imss endpoint takes ...

Debian/Ubuntu ntfs-3g Local Privilege Escalation Exploit

Disclosed: January 05, 2017

ntfs-3g mount helper in Ubuntu 16.04, 16.10, Debian 7, 8, and possibly 9 does not properly sanitize the environment when executing modprobe. This can be abused to load a kernel module and execute a binary payload as the root user.

PHPMailer Sendmail Argument Injection Exploit

Disclosed: December 26, 2016

PHPMailer versions up to and including 5.2.19 are affected by a vulnerability which can be leveraged by an attacker to write a file with partially controlled contents to an arbitrary location through injection of arguments that are passed to the sendmail binary. This module writes a payload to the web root of the ...

TrueOnline / ZyXEL P660HN-T v2 Router Authenticated Command Injection Exploit

Disclosed: December 26, 2016

TrueOnline is a major ISP in Thailand, and it distributes a customised version of the ZyXEL P660HN-T v2 router. This customised version has an authenticated command injection vulnerability in the remote log forwarding page. This can be exploited using the "supervisor" account that comes with a default password on the devi...