A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,041 - 3,060 of 5,754 in total
SAMR Computer Management
Created: July 16, 2022
module
Explore
Cambium cnPilot r200/r201 Command Execution as 'root'
Created: June 14, 2018
module
Explore
D-Link DSL 320B Password Extractor
Created: May 30, 2018
module
Explore
JBoss JMX Console DeploymentFileRepository WAR Upload and Deployment
Created: May 30, 2018
module
Explore
Kerberos Silver/Golden/Diamond/Sapphire Ticket Forging
Created: January 27, 2023
module
Explore
Role Base Constrained Delegation
Created: October 31, 2022
module
Explore
UDP Wake-On-Lan (WOL)
Created: May 30, 2018
module
Explore
Microsoft SQL Server Configuration Enumerator
Created: May 30, 2018
module
Explore
Microsoft SQL Server Escalate Db_Owner
Created: May 30, 2018
module
Explore
Microsoft SQL Server SQLi NTLM Stealer
Created: May 30, 2018
module
Explore
MySQL Enumeration Module
Created: May 30, 2018
module
Explore
NetBIOS Response Brute Force Spoof (Direct)
Created: May 30, 2018
module
Explore
TrendMicro OfficeScanNT Listener Traversal Arbitrary File Access
Created: May 30, 2018
module
Explore
Apple Airport Extreme Password Extraction (WDBRPC)
Created: May 30, 2018
module
Explore
Extract zip from Modbus communication
Created: June 26, 2019
module
Explore
MMS Client
Created: May 30, 2018
module
Explore
Amazon Web Services EC2 SSM enumeration
Created: June 01, 2023
module
Explore
F5 BigIP Access Policy Manager Session Exhaustion Denial of Service
Created: May 30, 2018
module
Explore
Samba read_nttrans_ea_list Integer Overflow
Created: May 30, 2018
module
Explore
DoS Exploitation of Allen-Bradley's Legacy Protocol (PCCC)
Created: March 19, 2019
module
Explore