Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 5,041 - 5,060 of 6,041 in total
MYSQL Schema Dump
Created: May 30, 2018
module
Explore
MySQL Server Version Enumeration
Created: May 30, 2018
module
Explore
MYSQL Directory Write Test
Created: May 30, 2018
module
Explore
NAT-PMP External Port Scanner
Created: May 30, 2018
module
Explore
Nessus NTP Login Utility
Created: May 30, 2018
module
Explore
Nessus RPC Interface Login Utility
Created: May 30, 2018
module
Explore
Nessus XMLRPC Interface Ping Utility
Created: May 30, 2018
module
Explore
NetBIOS Information Discovery
Created: May 30, 2018
module
Explore
NFS Mount Scanner
Created: May 30, 2018
module
Explore
NTP Monitor List Scanner
Created: May 30, 2018
module
Explore
NTP "NAK to the Future"
Created: May 30, 2018
module
Explore
NTP Clock Variables Disclosure
Created: May 30, 2018
module
Explore
Windows Recon Computer Browser Discovery
Created: May 30, 2018
module
Explore
Brocade Configuration Importer
Created: September 24, 2019
module
Explore
Cisco Secure ACS Unauthorized Password Change
Created: May 30, 2018
module
Explore
WordPress Ninja Forms Unauthenticated File Upload
Disclosed: May 04, 2016
module
Explore
Ubiquiti Configuration Importer
Created: April 09, 2020
module
Explore
Regsvr32.exe (.sct) Application Whitelisting Bypass Server
Disclosed: April 19, 2016
module
Explore
John the Ripper Password Cracker (Fast Mode)
Created: May 30, 2018
module
Explore
Oracle MySQL for Microsoft Windows Payload Execution
Disclosed: January 16, 2009
module
Explore