A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,441 - 3,460 of 5,754 in total
Apache Rave User Information Disclosure
Created: May 30, 2018
module
Explore
CorpWatch Company ID Information Search
Created: May 30, 2018
module
Explore
CorpWatch Company Name Information Search
Created: May 30, 2018
module
Explore
F5 BIG-IP Backend Cookie Disclosure
Created: May 30, 2018
module
Explore
Firefox PDF.js Browser File Theft
Created: May 30, 2018
module
Explore
Konica Minolta Password Extractor
Created: May 30, 2018
module
Explore
Peplink Balance routers SQLi
Created: August 28, 2020
module
Explore
Windows Secrets Dump
Created: September 30, 2020
module
Explore
Auxilliary Parser Windows Unattend Passwords
Created: May 30, 2018
module
Explore
CouchDB Login Utility
Created: May 30, 2018
module
Explore
DFSCoerce
Created: July 16, 2022
module
Explore
Microsoft Windows Deployment Services Unattend Retrieval
Created: May 30, 2018
module
Explore
DECT Call Scanner
Created: May 30, 2018
module
Explore
DECT Base Station Scanner
Created: May 30, 2018
module
Explore
GTP Echo Scanner
Created: May 01, 2019
module
Explore
Adobe XML External Entity Injection
Created: May 30, 2018
module
Explore
Advantech WebAccess Login
Created: May 30, 2018
module
Explore
AppleTV AirPlay Login Utility
Created: May 30, 2018
module
Explore
Binom3 Web Management Login Scanner, Config and Password File Dump
Created: May 30, 2018
module
Explore
HTTP Directory Brute Force Scanner
Created: May 30, 2018
module
Explore