Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,501 - 3,520 of 6,039 in total
Oracle ILO Manager Login Brute Force Utility
Created: May 30, 2018
module
Explore
Jenkins Server Broadcast Enumeration
Created: May 30, 2018
module
Explore
Gather Kademlia Server Information
Created: May 30, 2018
module
Explore
Dahua DVR Auth Bypass Scanner
Created: May 30, 2018
module
Explore
Metasploit Web Interface Login Utility
Created: May 30, 2018
module
Explore
HP LaserJet Printer SNMP Enumeration
Created: May 30, 2018
module
Explore
Ubee DDW3611b Cable Modem Wifi Enumeration
Created: May 30, 2018
module
Explore
Native LDAP Server (Example)
Created: December 29, 2021
module
Explore
SOCKS Proxy Server
Created: September 23, 2020
module
Explore
WPAD.dat File Server
Created: May 30, 2018
module
Explore
pSnuffle Packet Sniffer
Created: May 30, 2018
module
Explore
Forge Cisco DTP Packets
Created: May 30, 2018
module
Explore
mDNS Spoofer
Created: May 30, 2018
module
Explore
Pcap Replay Utility
Created: May 30, 2018
module
Explore
SMTP Simple Fuzzer
Created: May 30, 2018
module
Explore
F5 Networks Devices Management Interface Scanner
Created: May 30, 2018
module
Explore
TFTP Fetch, Reverse SCTP Stager
Created: May 18, 2023
module
Explore
TFTP Fetch, Linux x64 Command Shell, Reverse TCP Inline (IPv6)
Created: May 18, 2023
module
Explore
TFTP Fetch, Bind IPv6 TCP Stager (Linux x86)
Created: June 15, 2023
module
Explore
TFTP Fetch, Bind TCP Stager
Created: June 15, 2023
module
Explore