Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,461 - 3,480 of 6,039 in total
LLMNR Spoofer
Created: May 30, 2018
module
Explore
NetBIOS Name Service Spoofer
Created: May 30, 2018
module
Explore
RuggedCom Telnet Password Generator
Created: May 30, 2018
module
Explore
UPnP SSDP M-SEARCH Information Discovery
Created: May 30, 2018
module
Explore
Varnish Cache CLI File Read
Created: June 14, 2018
module
Explore
VMWare ESX/ESXi Fingerprint Scanner
Created: May 30, 2018
module
Explore
VMWare Enumerate Virtual Machines
Created: May 30, 2018
module
Explore
Apple Remote Desktop Root Vulnerability
Created: June 14, 2018
module
Explore
VNC Authentication None Detection
Created: May 30, 2018
module
Explore
VxWorks WDB Agent Boot Parameter Scanner
Created: May 30, 2018
module
Explore
WinRM WQL Query Runner
Created: May 30, 2018
module
Explore
WS-Discovery Information Discovery
Created: June 14, 2018
module
Explore
Authentication Capture: DRDA (DB2, Informix, Derby)
Created: May 30, 2018
module
Explore
Authentication Capture: FTP
Created: May 30, 2018
module
Explore
Microsoft SQL Server Generic Query from File
Created: May 30, 2018
module
Explore
MySQL Enumeration Module
Created: May 30, 2018
module
Explore
MySQL SQL Generic Query
Created: May 30, 2018
module
Explore
Mikrotik Configuration Importer
Created: August 08, 2020
module
Explore
VyOS Configuration Importer
Created: September 28, 2020
module
Explore
Oracle Database Enumeration
Created: May 30, 2018
module
Explore