Exploit Database

The Rapid7 Exploit Database is an archive of Metasploit modules for publicly known exploits, 0days, remote exploits, shellcode, and more for researches and penetration testers to review. 3,000 plus modules are all available with relevant links to other technical documentation and source code. All of the modules included in the Exploit Database are also included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro.


Displaying module details 61 - 70 of 3783 in total

Atlassian Jira Authenticated Upload Code Execution Exploit

Disclosed: February 22, 2018

This module can be used to execute a payload on Atlassian Jira via the Universal Plugin Manager(UPM). The module requires valid login credentials to an account that has access to the plugin manager. The payload is uploaded as a JAR archive containing a servlet using a POST request against the UPM component. The ch...

Eclipse Equinoxe OSGi Console Command Execution Exploit

Disclosed: February 13, 2018

Exploit Eclipse Equinoxe OSGi (Open Service Gateway initiative) console 'fork' command to execute arbitrary commands on the remote system..

Nanopool Claymore Dual Miner APIs RCE Exploit

Disclosed: February 09, 2018

This module takes advantage of miner remote manager APIs to exploit an RCE vulnerability.

Exodus Wallet (ElectronJS Framework) remote Code Execution Exploit

Disclosed: January 25, 2018

This module exploits a Remote Code Execution vulnerability in Exodus Wallet, a vulnerability in the ElectronJS Framework protocol handler can be used to get arbitrary command execution if the user clicks on a specially crafted URL.

AsusWRT LAN Unauthenticated Remote Code Execution Exploit

Disclosed: January 22, 2018

The HTTP server in AsusWRT has a flaw where it allows an unauthenticated client to perform a POST in certain cases. This can be combined with another vulnerability in the VPN configuration upload routine that sets NVRAM configuration variables directly from the POST request to enable a special command mode. This command m...

CloudMe Sync v1.10.9 Exploit

Disclosed: January 17, 2018

This module exploits a stack-based buffer overflow vulnerability in CloudMe Sync v1.10.9 client application. This module has been tested successfully on Windows 7 SP1 x86.

glibc 'realpath()' Privilege Escalation Exploit

Disclosed: January 16, 2018

This module attempts to gain root privileges on Linux systems by abusing a vulnerability in GNU C Library (glibc) version 2.26 and prior. This module uses halfdog's RationalLove exploit to exploit a buffer underflow in glibc realpath() and create a SUID root shell. The exploit has offsets for glibc versions 2.23-...

GitStack Unauthenticated REST API Requests Exploit

Disclosed: January 15, 2018

This modules exploits unauthenticated REST API requests in GitStack through v2.3.10. The module supports requests for listing users of the application and listing available repositories. Additionally, the module can create a user and add the user to the application's repositories. This module has been tested against GitSt...

GitStack Unsanitized Argument RCE Exploit

Disclosed: January 15, 2018

This module exploits a remote code execution vulnerability that exists in GitStack through v2.3.10, caused by an unsanitized argument being passed to an exec function call. This module has been tested on GitStack v2.3.10.

Windows UAC Protection Bypass (Via Slui File Handler Hijack) Exploit

Disclosed: January 15, 2018

This module will bypass UAC on Windows 8-10 by hijacking a special key in the Registry under the Current User hive, and inserting a custom command that will get invoked when any binary (.exe) application is launched. But slui.exe is an auto-elevated binary that is vulnerable to file handler hijacking. When we run sl...