Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 4,281 - 4,300 of 6,041 in total
Lotus Domino Brute Force Utility
Created: May 30, 2018
module
Explore
cups-browsed Information Disclosure
Created: October 03, 2024
module
Explore
Multiple DVR Manufacturers Configuration Disclosure
Created: May 30, 2018
module
Explore
FreeSWITCH Event Socket Login
Created: July 16, 2022
module
Explore
IBM WebSphere MQ Login Check
Created: March 19, 2019
module
Explore
Apache RocketMQ Version Scanner
Created: June 14, 2023
module
Explore
Metasploit RPC Interface Login Utility
Created: May 30, 2018
module
Explore
Metasploit Web Interface Login Utility
Created: May 30, 2018
module
Explore
NNTP Login Utility
Created: May 30, 2018
module
Explore
NTP Clock Variables Disclosure
Created: May 30, 2018
module
Explore
NTP Timeroast
Created: December 20, 2024
module
Explore
Authentication Capture: POP3
Created: May 30, 2018
module
Explore
Authentication Capture: SIP
Created: May 30, 2018
module
Explore
Authentication Capture: Telnet
Created: May 30, 2018
module
Explore
Authentication Capture: VNC
Created: May 30, 2018
module
Explore
HTTP Client MS Credential Relayer
Created: May 30, 2018
module
Explore
Native LDAP Server (Example)
Created: December 29, 2021
module
Explore
ESC8 Relay: SMB to HTTP(S)
Created: November 06, 2024
module
Explore
SMB to HTTP relay version of Get NAA Creds
Created: May 06, 2025
module
Explore
SOCKS Proxy Server
Created: September 23, 2020
module
Explore