Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 5,081 - 5,100 of 6,041 in total
Solaris Gather Virtual Environment Detection
Created: May 30, 2018
module
Explore
Windows Manage Driver Loader
Created: May 30, 2018
module
Explore
Execute .NET Assembly
Created: April 14, 2020
module
Explore
Windows Manage Webcam
Created: May 30, 2018
module
Explore
Ivanti Connect Secure HTTP Scanner
Created: February 03, 2025
module
Explore
F5 Configuration Importer
Created: September 14, 2020
module
Explore
Ubiquiti Configuration Importer
Created: July 16, 2020
module
Explore
Simple FTP Fuzzer
Created: May 30, 2018
module
Explore
HTTP GET Request URI Fuzzer (Incrementing Lengths)
Created: May 30, 2018
module
Explore
HTTP Form Field Fuzzer
Created: May 30, 2018
module
Explore
HTTP GET Request URI Fuzzer (Fuzzer Strings)
Created: May 30, 2018
module
Explore
Android Content Provider File Disclosure
Created: May 30, 2018
module
Explore
Host Information Enumeration via NTLM Authentication
Created: May 30, 2018
module
Explore
OPNSense Login Scanner
Created: May 02, 2025
module
Explore
SAP BusinessObjects User Bruteforcer
Created: May 30, 2018
module
Explore
HTTP Page Scraper
Created: May 30, 2018
module
Explore
SMTP Banner Grabber
Created: May 30, 2018
module
Explore
Test SSH Github Access
Created: December 01, 2019
module
Explore
VMWare Web Login Scanner
Created: May 30, 2018
module
Explore
HTTP Client Basic Authentication Credential Collector
Created: May 30, 2018
module
Explore