Metasploit Exploits

3,189 exploits tracked across all sources.

Sort: Activity Stars
CVE-2017-11317 METASPLOIT CRITICAL ruby
Telerik UI For Asp.net Ajax < 2016.3.1027 - Weak Encryption
Telerik.Web.UI in Progress Telerik UI for ASP.NET AJAX before R1 2017 and R2 before R2 2017 SP2 uses weak RadAsyncUpload encryption, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
by Spencer McIntyre, Paul Taylor, Markus Wulftange, Caleb Gross, Alvaro Muñoz, Oleksandr Mirosh, straightblast
CVSS 9.8
CVE-2007-0774 METASPLOIT ruby
Apache Tomcat JK Web Server Connector <1.2.21 - RCE
Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.
CVE-2022-2143 METASPLOIT CRITICAL ruby
Product <Version> - Command Injection
The affected product is vulnerable to two instances of command injection, which may allow an attacker to remotely execute arbitrary code.
by rgod, y4er, Shelby Pace
CVSS 9.8
CVE-2006-4305 METASPLOIT ruby
Mysql Maxdb < 7.6.00.22 - Buffer Overflow
Buffer overflow in SAP DB and MaxDB before 7.6.00.30 allows remote attackers to execute arbitrary code via a long database name when connecting via a WebDBM client.
by MC
CVE-2009-3068 METASPLOIT ruby
Adobe Robohelp Server - Access Control
Unrestricted file upload vulnerability in the RoboHelpServer Servlet (robohelp/server) in Adobe RoboHelp Server 8 allows remote attackers to execute arbitrary code by uploading a Java Archive (.jsp) file during a PUBLISH action, then accessing it via a direct request to the file in the robohelp/robo/reserved/web directory under its sessionid subdirectory, as demonstrated by the vd_adobe module in VulnDisco Pack Professional 8.7 through 8.11.
by MC
CVE-2020-0646 METASPLOIT CRITICAL ruby
Microsoft .net Framework - Remote Code Execution
A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'.
by Spencer McIntyre, Soroush Dalili
CVSS 9.8
CVE-2020-1147 METASPLOIT HIGH ruby
Microsoft .net Core < 15.9 - Remote Code Execution
A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input, aka '.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability'.
by Steven Seeley, Soroush Dalili, Spencer McIntyre
CVSS 7.8
CVE-2012-1195 METASPLOIT ruby
Landesk Lenovo Thinkmanagement Console - Access Control
Unrestricted file upload vulnerability in andesk/managementsuite/core/core.anonymous/ServerSetup.asmx in the ServerSetup web service in Lenovo ThinkManagement Console 9.0.3 allows remote attackers to execute arbitrary code by uploading a file with an executable extension via a PutUpdateFileCore command in a RunAMTCommand SOAP request, then accessing the file via a direct request to the file in the web root.
by Andrea Micalizzi, juan vazquez
CVE-2009-2265 METASPLOIT ruby
FCKeditor <2.6.4.1 - Path Traversal
Multiple directory traversal vulnerabilities in FCKeditor before 2.6.4.1 allow remote attackers to create executable files in arbitrary directories via directory traversal sequences in the input to unspecified connector modules, as exploited in the wild for remote code execution in July 2009, related to the file browser and the editor/filemanager/connectors/ directory.
by MC
CVE-2025-49706 METASPLOIT MEDIUM ruby
Microsoft Sharepoint Enterprise Server - Authentication Bypass
Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.
by Viettel Cyber Security, sfewer-r7
CVSS 6.5
CVE-2020-7356 METASPLOIT CRITICAL ruby
Cayintech Xpost - SQL Injection
CAYIN xPost suffers from an unauthenticated SQL Injection vulnerability. Input passed via the GET parameter 'wayfinder_seqid' in wayfinder_meeting_input.jsp is not properly sanitized before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code and execute SYSTEM commands.
by h00die, Gjoko Krstic (LiquidWorm) <[email protected]>
CVSS 10.0
CVE-2009-3711 METASPLOIT ruby
Jasper Httpdx - Memory Corruption
Stack-based buffer overflow in the h_handlepeer function in http.cpp in httpdx 1.4, and possibly 1.4.3, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP GET request.
CVE-2008-4008 METASPLOIT ruby
BEA Product Suite - Unspecified Vuln
Unspecified vulnerability in the WebLogic Server Plugins for Apache component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, 7.0 SP7, and 6.1 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2008 CPU. Oracle has not commented on reliable researcher claims that this issue is a stack-based buffer overflow in the WebLogic Apache Connector, related to an invalid parameter.
CVE-2004-2271 METASPLOIT ruby
MiniShare <1.4.1 - RCE
Buffer overflow in MiniShare 1.4.1 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request.
CVE-2012-5357 METASPLOIT CRITICAL ruby
Ektron CMS <8.02 SP5 - RCE
Ektron Content Management System (CMS) before 8.02 SP5 uses the XslCompiledTransform class with enablescript set to true, which allows remote attackers to execute arbitrary code with NETWORK SERVICE privileges via crafted XSL data.
by Rich Lundeen, juan vazquez, Nicolas, Gregoire
CVSS 9.8
CVE-2020-27386 METASPLOIT HIGH ruby
FlexDotnetCMS <1.5.9 - RCE
An unrestricted file upload issue in FlexDotnetCMS before v1.5.9 allows an authenticated remote attacker to upload and execute arbitrary files by using the FileManager to upload malicious code (e.g., ASP code) in the form of a safe file type (e.g., a TXT file), and then using the FileEditor (in v1.5.8 and prior) or the FileManager's rename function (in v1.5.7 and prior) to rename the file to an executable extension (e.g., ASP), and finally executing the file via an HTTP GET request to /<path_to_file>.
by Erik Wynter
CVSS 8.8
CVE-2022-41082 METASPLOIT HIGH ruby
Microsoft Exchange Server - RCE
Microsoft Exchange Server Remote Code Execution Vulnerability
by Orange Tsai, Spencer McIntyre, DA-0x43-Dx4-DA-Hx2-Tx2-TP-S-Q, Piotr Bazydło, Rich Warren, Soroush Dalili
CVSS 8.0
CVE-2021-23758 METASPLOIT HIGH ruby
Ajaxpro.2 < 21.10.30.1 - Insecure Deserialization
All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.
by Hans-Martin Münch (MOGWAI LABS), Jemmy Wang
CVSS 8.1
CVE-2012-10047 METASPLOIT CRITICAL ruby
Cyclope Employee Surveillance Solution 6.x - SQL Injection
Cyclope Employee Surveillance Solution versions 6.x is vulnerable to a SQL injection flaw in its login mechanism. The username parameter in the auth-login POST request is not properly sanitized, allowing attackers to inject arbitrary SQL statements. This can be leveraged to write and execute a malicious PHP file on disk, resulting in remote code execution under the SYSTEM user context.
by loneferret, sinn3r
CVE-2017-9544 METASPLOIT CRITICAL ruby
EFS Software Easy Chat Server <3.1 - Buffer Overflow
There is a remote stack-based buffer overflow (SEH) in register.ghp in EFS Software Easy Chat Server versions 2.0 to 3.1. By sending an overly long username string to registresult.htm for registering the user, an attacker may be able to execute arbitrary code.
by Marco Rivoli, Aitezaz Mohsin
CVSS 9.8
CVE-2013-4822 METASPLOIT ruby
HP iMC/BIMS - RCE
Unspecified vulnerability in HP Intelligent Management Center (iMC) and HP IMC Branch Intelligent Management System Software Module (aka BIMS) allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1606.
CVE-2002-2268 METASPLOIT ruby
Netdave Webster HTTP Server - Memory Corruption
Buffer overflow in Webster HTTP Server allows remote attackers to execute arbitrary code via a long URL.
CVE-2024-4577 METASPLOIT CRITICAL ruby
PHP CGI Argument Injection Remote Code Execution
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
by Orange Tsai, watchTowr, sfewer-r7
CVSS 9.8
CVE-2005-1348 METASPLOIT ruby
MailEnable <1.04 - RCE
Buffer overflow in HTTPMail in MailEnable Enterprise 1.04 and earlier and Professional 1.54 and earlier allows remote attackers to execute arbitrary code via a long HTTP Authorization header.
CVE-2012-10062 METASPLOIT HIGH ruby
XAMPP 1.7.3 - RCE
A vulnerability in XAMPP, developed by Apache Friends, version 1.7.3's default WebDAV configuration allows remote authenticated attackers to upload and execute arbitrary PHP code. The WebDAV service, accessible via /webdav/, accepts HTTP PUT requests using default credentials. This permits attackers to upload a malicious PHP payload and trigger its execution via a subsequent GET request, resulting in remote code execution on the server.
by theLightCosine