Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,161 - 3,180 of 6,038 in total
Shodan Search
Created: May 30, 2018
module
Explore
Snare Lite for Windows Registry Access
Created: May 30, 2018
module
Explore
SolarWinds Serv-U Unauthenticated Arbitrary File Read
Created: June 19, 2024
module
Explore
SSL Labs API Client
Created: May 30, 2018
module
Explore
Windows Secrets Dump
Created: September 30, 2020
module
Explore
WordPress W3-Total-Cache Plugin 0.9.2.4 (or before) Username and Hash Extract
Created: May 30, 2018
module
Explore
Xymon Daemon Gather Information
Created: August 15, 2019
module
Explore
LDAP Login Scanner
Created: October 02, 2023
module
Explore
Apple Filing Protocol Login Utility
Created: May 30, 2018
module
Explore
AMQP 0-9-1 Login Check Scanner
Created: March 29, 2023
module
Explore
AMQP 0-9-1 Version Scanner
Created: March 29, 2023
module
Explore
CouchDB Enum Utility
Created: May 30, 2018
module
Explore
DB2 Authentication Brute Force Utility
Created: May 30, 2018
module
Explore
DB2 Discovery Service Detection
Created: May 30, 2018
module
Explore
Endpoint Mapper Service Discovery
Created: May 30, 2018
module
Explore
Hidden DCERPC Service Discovery
Created: May 30, 2018
module
Explore
MS-NRPC Domain Users Enumeration
Created: June 25, 2024
module
Explore
PetitPotam
Created: February 05, 2022
module
Explore
DCERPC TCP Service Auditor
Created: May 30, 2018
module
Explore
DECT Call Scanner
Created: May 30, 2018
module
Explore