Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 4,021 - 4,040 of 6,041 in total
Multi Gather Ubiquiti UniFi Controller Backup
Created: May 15, 2019
module
Explore
UNIX Gather Cached AD Hashes
Created: May 04, 2021
module
Explore
UNIX Gather Kerberos Tickets
Created: May 04, 2021
module
Explore
Multiplatform WLAN Enumeration and Geolocation
Created: May 30, 2018
module
Explore
Multi Generic Operating System Session Command Execution
Created: May 30, 2018
module
Explore
Write Messages to Users
Created: May 30, 2018
module
Explore
Multi Manage Network Route via Meterpreter Session
Created: May 30, 2018
module
Explore
Multi Manage DbVisualizer Add Db Admin
Created: May 30, 2018
module
Explore
Multi Manage DbVisualizer Query
Created: May 30, 2018
module
Explore
Web browsers HSTS entries eraser
Created: June 14, 2018
module
Explore
Multi Manage Post Module Macro Execution
Created: May 30, 2018
module
Explore
Multi Manage YouTube Broadcast
Created: May 30, 2018
module
Explore
Multi Manage Record Microphone
Created: May 30, 2018
module
Explore
Multi Manage Set Wallpaper
Created: May 30, 2018
module
Explore
Shell to Meterpreter Upgrade
Created: May 30, 2018
module
Explore
Multi Manage System Remote TCP Shell Session
Created: May 30, 2018
module
Explore
Multi Manage File Compressor
Created: May 30, 2018
module
Explore
QQ Credential Gatherer
Created: September 28, 2021
module
Explore
Quassel IRC Credential Gatherer
Created: May 17, 2024
module
Explore
Windows Gather Razer Synapse Password Extraction
Created: May 30, 2018
module
Explore