Exploit Database

The Rapid7 Exploit Database is an archive of Metasploit modules for publicly known exploits, 0days, remote exploits, shellcode, and more for researches and penetration testers to review. 3,000 plus modules are all available with relevant links to other technical documentation and source code. All of the modules included in the Exploit Database are also included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro.


Displaying module details 41 - 50 of 3438 in total

Trend Micro InterScan Messaging Security (Virtual Appliance) Remote Code Execution Exploit

Disclosed: January 15, 2017

This module exploits a command injection vulnerability in the Trend Micro IMSVA product. An authenticated user can execute a terminal command under the context of the web server user which is root. Besides, default installation of IMSVA comes with a default administrator credentials. saveCert.imss endpoint takes ...

Debian/Ubuntu ntfs-3g Local Privilege Escalation Exploit

Disclosed: January 05, 2017

ntfs-3g mount helper in Ubuntu 16.04, 16.10, Debian 7, 8, and possibly 9 does not properly sanitize the environment when executing modprobe. This can be abused to load a kernel module and execute a binary payload as the root user.

TrueOnline / Billion 5200W-T Router Unauthenticated Command Injection Exploit

Disclosed: December 26, 2016

TrueOnline is a major ISP in Thailand, and it distributes a customised version of the Billion 5200W-T router. This customised version has at least two command injection vulnerabilities, one authenticated and one unauthenticated, on different firmware versions. This module will attempt to exploit the unauthenticated inject...

PHPMailer Sendmail Argument Injection Exploit

Disclosed: December 26, 2016

PHPMailer versions up to and including 5.2.19 are affected by a vulnerability which can be leveraged by an attacker to write a file with partially controlled contents to an arbitrary location through injection of arguments that are passed to the sendmail binary. This module writes a payload to the web root of the ...

TrueOnline / ZyXEL P660HN-T v2 Router Authenticated Command Injection Exploit

Disclosed: December 26, 2016

TrueOnline is a major ISP in Thailand, and it distributes a customised version of the ZyXEL P660HN-T v2 router. This customised version has an authenticated command injection vulnerability in the remote log forwarding page. This can be exploited using the "supervisor" account that comes with a default password on the devi...

TrueOnline / ZyXEL P660HN-T v1 Router Unauthenticated Command Injection Exploit

Disclosed: December 26, 2016

TrueOnline is a major ISP in Thailand, and it distributes a customised version of the ZyXEL P660HN-T v1 router. This customised version has an unauthenticated command injection vulnerability in the remote log forwarding page. This module was tested in an emulated environment, as the author doesn't have access to the ...

NETGEAR WNR2000v5 (Un)authenticated hidden_lang_avi Stack Overflow Exploit

Disclosed: December 20, 2016

The NETGEAR WNR2000 router has a buffer overflow vulnerability in the hidden_lang_avi parameter. In order to exploit it, it is necessary to guess the value of a certain timestamp which is in the configuration of the router. An authenticated attacker can simply fetch this from a page, but an unauthenticated attacke...

NETGEAR WNR2000v5 Administrator Password Recovery Exploit

Disclosed: December 20, 2016

The NETGEAR WNR2000 router has a vulnerability in the way it handles password recovery. This vulnerability can be exploited by an unauthenticated attacker who is able to guess the value of a certain timestamp which is in the configuration of the router. Bruteforcing the timestamp token might take a few minutes, a few hour...

Netgear R7000 and R6400 cgi-bin Command Injection Exploit

Disclosed: December 06, 2016

This module exploits an arbitrary command injection vulnerability in Netgear R7000 and R6400 router firmware version 1.0.7.2_1.1.93 and possibly earlier.

DiskBoss Enterprise GET Buffer Overflow Exploit

Disclosed: December 05, 2016

This module exploits a stack-based buffer overflow vulnerability in the web interface of DiskBoss Enterprise v7.5.12 and v7.4.28, caused by improper bounds checking of the request path in HTTP GET requests sent to the built-in web server. This module has been tested successfully on Windows XP SP3 and Windows 7 SP1.