Metasploit
1,875 exploits
Active since Aug 1990
v0pCr3w (Web Shell) - Remote Code Execution (Metasploit)
Total.js CMS 12.0.0 - Authenticated RCE
CVSS 9.9
Tinc < 1.0.20 - Memory Corruption
TeamCity Agent - XML-RPC Command Execution (Metasploit)
TeamCity Agent - XML-RPC Command Execution (Metasploit)
Symantec Workspace Streaming <7.5.0.749 - SSRF
Oracle Java SE/Jav for Bus <6 Update 21 - Info Disclosure
SUN Java System Web Server - Memory Corruption
Sun Java JRE getSoundbank file:// URI Buffer Overflow
Oracle Java SE/Jav for Bus <6 - Info Disclosure
Sun Java JRE AWT setDiffICM Buffer Overflow
Sun Java Calendar Deserialization Privilege Escalation
Unix - Info Disclosure
Squiggle 1.7 - SVG Browser Java Code Execution (Metasploit)
Square Squash - RCE
Splunk 5.0 - Custom App Remote Code Execution (Metasploit)
Sonicwall Analyzer - Authentication Bypass
CVSS 9.8
Solaris - Privilege Escalation
Snort < 2.6.1.2 - Buffer Overflow
Sun Java Calendar Deserialization Privilege Escalation
SAP SOAP RFC - SXPG_COMMAND_EXECUTE Remote Command Execution (Metasploit)
SAP SOAP RFC - SXPG_CALL_SYSTEM Remote Command Execution (Metasploit)
Web Console <2.1.3 - XSS
Ruby on Rails JSON Processor YAML Deserialization Code Execution
Ruby on Rails JSON Processor YAML Deserialization Code Execution