[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » author: Metasploit
Metasploit
Unitrends UEB 9 - http api/storage Remote Root (Metasploit)
remote
linux_x86
443.0
CVE-2017-12478
Metasploit
Tomcat - Remote Code Execution via JSP Upload Bypass (Metasploit)
remote
java
CVE-2017-12617
Metasploit
OrientDB 2.2.2 < 2.2.22 - Remote Code Execution (Metasploit)
remote
multiple
2480.0
Metasploit
Rancher Server - Docker Daemon Code Execution (Metasploit)
remote
linux_x86-64
8080.0
Metasploit
Qmail SMTP - Bash Environment Variable Injection (Metasploit)
remote
linux
CVE-2014-6271;OSVDB-112004
Metasploit
NodeJS Debugger - Command Injection (Metasploit)
remote
multiple
5858.0
Metasploit
Supervisor 3.0a1 < 3.3.2 - XML-RPC (Authenticated) Remote Code Execution (Metasploit)
remote
linux
9001.0
CVE-2017-11610
Metasploit
Disk Pulse Enterprise 9.9.16 - GET Buffer Overflow (Metasploit)
remote
windows
80.0
Metasploit
Docker Daemon - Unprotected TCP Socket (Metasploit)
remote
python
2375.0
Metasploit
Gh0st Client (C2 Server) - Remote Buffer Overflow (Metasploit)
remote
windows
80.0
Metasploit
Gh0st Client (C2 Server) - Remote Buffer Overflow (Metasploit)
remote
windows
80.0
Metasploit
Git < 2.7.5 - Command Injection (Metasploit)
remote
python
CVE-2017-1000117
Metasploit
QNAP Transcode Server - Command Execution (Metasploit)
remote
hardware
9251.0
Metasploit
IBM OpenAdmin Tool - SOAP welcomeServer PHP Code Execution (Metasploit)
remote
php
CVE-2017-1092
Metasploit
Microsoft Windows - Escalate UAC Protection Bypass (Via COM Handler Hijack) (Metasploit)
local
windows
Metasploit
Microsoft Windows - Escalate UAC Protection Bypass (Via COM Handler Hijack) (Metasploit)
local
windows
«
...
20
21
22
23
24
25
26
27
28
29
30
...
»
page: 25/121 [exploits: 1928]