Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,901 - 3,920 of 6,041 in total
CouchDB Login Utility
Created: May 30, 2018
module
Explore
CouchDB Enum Utility
Created: May 30, 2018
module
Explore
Energizer DUO Trojan Scanner
Created: May 30, 2018
module
Explore
AMQP 0-9-1 Version Scanner
Created: March 29, 2023
module
Explore
AMQP 0-9-1 Login Check Scanner
Created: March 29, 2023
module
Explore
Apple Filing Protocol Info Enumerator
Created: May 30, 2018
module
Explore
Auxiliary Parser Windows Unattend Passwords
Created: May 30, 2018
module
Explore
Gather PDF Authors
Created: May 30, 2018
module
Explore
HP Operations Manager Perfd Environment Scanner
Created: May 30, 2018
module
Explore
FortiOS Path Traversal Credential Gatherer
Created: February 27, 2021
module
Explore
Firefox PDF.js Browser File Theft
Created: May 30, 2018
module
Explore
Discover External IP via Ifconfig.me
Created: May 30, 2018
module
Explore
CrushFTP Unauthenticated Arbitrary File Read
Created: May 07, 2024
module
Explore
CrushFTP AWS4-HMAC Authentication Bypass
Created: April 04, 2025
module
Explore
CorpWatch Company Name Information Search
Created: May 30, 2018
module
Explore
Citrix MetaFrame ICA Published Applications Bruteforcer
Created: May 30, 2018
module
Explore
Password Cracker: Databases
Created: November 08, 2019
module
Explore
Password Cracker: AIX
Created: November 08, 2019
module
Explore
Apply Pot File To Hashes
Created: March 19, 2019
module
Explore
Better
Created: May 30, 2018
module
Explore