Exploit Database

The Rapid7 Exploit Database is an archive of Metasploit modules for publicly known exploits, 0days, remote exploits, shellcode, and more for researches and penetration testers to review. 3,000 plus modules are all available with relevant links to other technical documentation and source code. All of the modules included in the Exploit Database are also included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro.

Displaying module details 61 - 70 of 3733 in total

Polycom Shell HDX Series Traceroute Command Execution Exploit

Disclosed: November 12, 2017

Within Polycom command shell, a command execution flaw exists in lan traceroute, one of the dev commands, which allows for an attacker to execute arbitrary payloads with telnet or openssl.

Samsung Internet Browser SOP Bypass Exploit

Disclosed: November 08, 2017

This module takes advantage of a Same-Origin Policy (SOP) bypass vulnerability in the Samsung Internet Browser, a popular mobile browser shipping with Samsung Android devices. By default, it initiates a redirect to a child tab, and rewrites the innerHTML to gather credentials via a fake pop-up.

pfSense authenticated group member RCE Exploit

Disclosed: November 06, 2017

pfSense, a free BSD based open source firewall distribution, version <= 2.3.1_1 contains a remote command execution vulnerability post authentication in the system_groupmanager.php page. Verified against 2.2.6 and 2.3.

Advantech WebAccess Webvrpcs Service Opcode 80061 Stack Buffer Overflow Exploit

Disclosed: November 02, 2017

This module exploits a stack buffer overflow in Advantech WebAccess 8.2. By sending a specially crafted DCERPC request, an attacker could overflow the buffer and execute arbitrary code.

Brother Debut http Denial Of Service Exploit

Disclosed: November 02, 2017

The Debut embedded HTTP server <= 1.20 on Brother printers allows for a Denial of Service (DoS) condition via a crafted HTTP request. The printer will be unresponsive from HTTP and printing requests for ~300 seconds. After which, the printer will start responding again.

Xplico Remote Code Execution Exploit

Disclosed: October 29, 2017

This module exploits command injection vulnerability. Unauthenticated users can register a new account and then execute a terminal command under the context of the root user. The specific flaw exists within the Xplico, which listens on TCP port 9876 by default. The goal of Xplico is extract from an internet traffic captu...

Tuleap 9.6 Second-Order PHP Object Injection Exploit

Disclosed: October 23, 2017

This module exploits a Second-Order PHP Object Injection vulnerability in Tuleap <= 9.6 which could be abused by authenticated users to execute arbitrary PHP code with the permissions of the webserver. The vulnerability exists because of the User::getRecentElements() method is using the unserialize() function with data th...

Ayukov NFTP FTP Client Buffer Overflow Exploit

Disclosed: October 21, 2017

This module exploits a stack-based buffer overflow vulnerability against Ayukov NFTPD FTP Client 2.0 and earlier. By responding with a long string of data for the SYST request, it is possible to cause a denail-of-service condition on the FTP client, or arbitrary remote code exeuction under the context of the user if...

Oracle WebLogic wls-wsat Component Deserialization RCE Exploit

Disclosed: October 19, 2017

The Oracle WebLogic WLS WSAT Component is vulnerable to a XML Deserialization remote code execution vulnerability. Supported versions that are affected are,, and Discovered by Alexey Tyurin of ERPScan and Federico Dotta of Media Service. Please note that SRVHOST, SRVPORT, ...

Microsoft Office DDE Payload Delivery Exploit

Disclosed: October 09, 2017

This module generates an DDE command to place within a word document, that when executed, will retrieve a HTA payload via HTTP from an web server.