Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,121 - 3,140 of 6,038 in total
UDP Wake-On-Lan (WOL)
Created: May 30, 2018
module
Explore
Microsoft SQL Server SUSER_SNAME Windows Domain Account Enumeration
Created: May 30, 2018
module
Explore
Microsoft SQL Server Find and Sample Data
Created: May 30, 2018
module
Explore
Microsoft SQL Server Interesting Data Finder
Created: May 30, 2018
module
Explore
Microsoft SQL Server NTLM Stealer
Created: May 30, 2018
module
Explore
Microsoft SQL Server SQLi NTLM Stealer
Created: May 30, 2018
module
Explore
NAT-PMP Port Mapper
Created: May 30, 2018
module
Explore
Cisco Secure ACS Unauthorized Password Change
Created: July 16, 2020
module
Explore
Ubiquiti Configuration Importer
Created: July 16, 2020
module
Explore
TrendMicro OfficeScanNT Listener Traversal Arbitrary File Access
Created: May 30, 2018
module
Explore
PostgreSQL Server Generic Query
Created: May 30, 2018
module
Explore
Unitronics PCOM remote START/STOP/RESET command
Created: March 19, 2019
module
Explore
TrendMicro ServerProtect File Access
Created: May 30, 2018
module
Explore
SMB Scanner Check File/Directory Utility
Created: May 30, 2018
module
Explore
Windows SMB Multi Dropper
Created: June 14, 2018
module
Explore
Microsoft Word UNC Path Injector
Created: May 01, 2025
module
Explore
HTTP Form Field Fuzzer
Created: May 30, 2018
module
Explore
HTTP GET Request URI Fuzzer (Incrementing Lengths)
Created: May 30, 2018
module
Explore
NTP Protocol Fuzzer
Created: May 30, 2018
module
Explore
SMB Create Pipe Request Fuzzer
Created: May 30, 2018
module
Explore