Exploit Database

The Rapid7 Exploit Database is an archive of Metasploit modules for publicly known exploits, 0days, remote exploits, shellcode, and more for researches and penetration testers to review. 3,000 plus modules are all available with relevant links to other technical documentation and source code. All of the modules included in the Exploit Database are also included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro.


Displaying module details 11 - 20 of 3570 in total

Advantech WebAccess Webvrpcs Service Opcode 80061 Stack Buffer Overflow Exploit

Disclosed: November 02, 2017

This module exploits a stack buffer overflow in Advantech WebAccess 8.2. By sending a specially crafted DCERPC request, an attacker could overflow the buffer and execute arbitrary code.

Xplico Remote Code Execution Exploit

Disclosed: October 29, 2017

This module exploits command injection vulnerability. Unauthenticated users can register a new account and then execute a terminal command under the context of the root user. The specific flaw exists within the Xplico, which listens on TCP port 9876 by default. The goal of Xplico is extract from an internet traffic captu...

Tuleap 9.6 Second-Order PHP Object Injection Exploit

Disclosed: October 23, 2017

This module exploits a Second-Order PHP Object Injection vulnerability in Tuleap <= 9.6 which could be abused by authenticated users to execute arbitrary PHP code with the permissions of the webserver. The vulnerability exists because of the User::getRecentElements() method is using the unserialize() function with data th...

Ayukov NFTP FTP Client Buffer Overflow Exploit

Disclosed: October 21, 2017

This module exploits a stack-based buffer overflow vulnerability against Ayukov NFTPD FTP Client 2.0 and earlier. By responding with a long string of data for the SYST request, it is possible to cause a denail-of-service condition on the FTP client, or arbitrary remote code exeuction under the context of the user if...

Easy Chat Server User Registeration Buffer Overflow (SEH) Exploit

Disclosed: October 09, 2017

This module exploits a buffer overflow during user registration in Easy Chat Server software.

Microsoft Office DDE Payload Delivery Exploit

Disclosed: October 09, 2017

This module generates an DDE command to place within a word document, that when executed, will retrieve a HTA payload via HTTP from an web server.

Trend Micro OfficeScan Remote Code Execution Exploit

Disclosed: October 07, 2017

This module exploits the authentication bypass and command injection vulnerability together. Unauthenticated users can execute a terminal command under the context of the web server user. The specific flaw exists within the management interface, which listens on TCP port 443 by default. The Trend Micro Officescan product ...

Trend Micro InterScan Messaging Security (Virtual Appliance) Remote Code Execution Exploit

Disclosed: October 07, 2017

This module exploits the authentication bypass and command injection vulnerability together. Unauthenticated users can execute a terminal command under the context of the web server user. The specific flaw exists within the management interface, which listens on TCP port 443 by default. Trend Micro IMSVA product have wid...

Tomcat RCE via JSP Upload Bypass Exploit

Disclosed: October 03, 2017

This module uploads a jsp payload and executes it.

phpCollab 2.5.1 Unauthenticated File Upload Exploit

Disclosed: September 29, 2017

This module exploits a file upload vulnerability in phpCollab 2.5.1 which could be abused to allow unauthenticated users to execute arbitrary code under the context of the web server user. The exploit has been tested on Ubuntu 16.04.3 64-bit