Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 4,301 - 4,320 of 6,041 in total
Cambium ePMP 1000 Login Scanner
Created: May 30, 2018
module
Explore
HTTP Error Based SQL Injection Scanner
Created: May 30, 2018
module
Explore
D-Link DIR 645 Password Extractor
Created: May 30, 2018
module
Explore
SMTP Simple Fuzzer
Created: May 30, 2018
module
Explore
SAP Management Console OSExecute
Created: May 30, 2018
module
Explore
UPnP IGD SOAP Port Mapping Utility
Created: May 30, 2018
module
Explore
VMWare Power Off Virtual Machine
Created: May 30, 2018
module
Explore
VxWorks WDB Agent Remote Memory Dump
Created: May 30, 2018
module
Explore
HP Operations Manager Perfd Environment Scanner
Created: May 30, 2018
module
Explore
AMQP 0-9-1 Login Check Scanner
Created: March 29, 2023
module
Explore
AMQP 0-9-1 Version Scanner
Created: March 29, 2023
module
Explore
Energizer DUO Trojan Scanner
Created: May 30, 2018
module
Explore
CouchDB Enum Utility
Created: May 30, 2018
module
Explore
CouchDB Login Utility
Created: May 30, 2018
module
Explore
DB2 Authentication Brute Force Utility
Created: May 30, 2018
module
Explore
DB2 Discovery Service Detection
Created: May 30, 2018
module
Explore
DFSCoerce
Created: July 16, 2022
module
Explore
Endpoint Mapper Service Discovery
Created: May 30, 2018
module
Explore
Hidden DCERPC Service Discovery
Created: May 30, 2018
module
Explore
PetitPotam
Created: February 05, 2022
module
Explore