Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 4,261 - 4,280 of 6,041 in total
Softing Secure Integration Server Login Utility
Created: March 01, 2023
module
Explore
HTTP Cross-Site Tracing Detection
Created: May 30, 2018
module
Explore
Typo3 Login Bruteforcer
Created: May 30, 2018
module
Explore
V-CMS Login Utility
Created: May 30, 2018
module
Explore
HTTP Verb Authentication Bypass Scanner
Created: May 30, 2018
module
Explore
VMWare Enumerate User Accounts
Created: May 30, 2018
module
Explore
WinRM Authentication Method Detection
Created: May 30, 2018
module
Explore
Fake DNS Service
Created: May 30, 2018
module
Explore
Hardware Bridge Server
Created: May 30, 2018
module
Explore
John the Ripper AIX Password Cracker
Created: May 30, 2018
module
Explore
John the Ripper Postgres SQL Password Cracker
Created: May 30, 2018
module
Explore
BSD Command Shell, Find Tag Stager
Created: May 30, 2018
module
Explore
BSD Command Shell, Find Port Inline
Created: May 30, 2018
module
Explore
HTTP Fetch
Created: June 02, 2023
module
Explore
HTTP Fetch
Created: February 20, 2025
module
Explore
HTTP Fetch, Linux Execute Command
Created: February 20, 2025
module
Explore
HTTP Fetch
Created: February 20, 2025
module
Explore
HTTP Fetch, Linux Execute Command
Created: June 15, 2023
module
Explore
HTTP Fetch, Reverse TCP Stager
Created: June 15, 2023
module
Explore
HTTPS Fetch, Reverse TCP Stager
Created: February 20, 2025
module
Explore