Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,681 - 3,700 of 6,039 in total
Novell Zenworks Mobile Device Management Admin Credentials
Created: May 30, 2018
module
Explore
OPNSense Login Scanner
Created: May 02, 2025
module
Explore
Oracle Enterprise Manager Control SID Discovery
Created: May 30, 2018
module
Explore
Oracle XML DB SID Discovery
Created: May 30, 2018
module
Explore
TCP Port Scanner
Created: May 30, 2018
module
Explore
PostgreSQL Version Probe
Created: May 30, 2018
module
Explore
Printer Volume Listing Scanner
Created: May 30, 2018
module
Explore
SAP /sap/bc/soap/rfc SOAP Service BAPI_USER_CREATE1 Function User Creation
Created: May 30, 2018
module
Explore
SAP /sap/bc/soap/rfc SOAP Service RFC_READ_TABLE Function Dump Data
Created: May 30, 2018
module
Explore
SAP SOAP RFC SXPG_COMMAND_EXECUTE
Created: May 30, 2018
module
Explore
SIPDroid Extension Grabber
Created: May 30, 2018
module
Explore
AIX SNMP Scanner Auxiliary Module
Created: May 30, 2018
module
Explore
SNMP Windows Username Enumeration
Created: May 30, 2018
module
Explore
Test SSH Github Access
Created: December 01, 2019
module
Explore
Android Meterpreter Shell, Reverse TCP Inline
Created: May 30, 2018
module
Explore
BSD x64 Command Shell, Bind TCP Inline (IPv6)
Created: May 30, 2018
module
Explore
BSD x64 Shell Bind TCP
Created: May 30, 2018
module
Explore
BSD x64 Command Shell, Reverse TCP Inline
Created: May 30, 2018
module
Explore
BSD Execute Command
Created: May 30, 2018
module
Explore
FreeBSD Meterpreter Service, Bind TCP
Created: May 30, 2018
module
Explore