A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,501 - 3,520 of 5,754 in total
Microsoft Plug and Play Service Registry Overflow
Created: May 30, 2018
module
Explore
BADPDF Malicious PDF Creator
Created: June 14, 2018
module
Explore
Android Content Provider File Disclosure
Created: May 30, 2018
module
Explore
Android Open Source Platform (AOSP) Browser UXSS
Created: May 30, 2018
module
Explore
Apache Rave User Information Disclosure
Created: May 30, 2018
module
Explore
Asterisk Gather Credentials
Created: May 30, 2018
module
Explore
Check Point Security Gateway Arbitrary File Read
Created: June 13, 2024
module
Explore
CrushFTP Unauthenticated Arbitrary File Read
Created: May 07, 2024
module
Explore
DNS Record Scanner and Enumerator
Created: May 30, 2018
module
Explore
Lansweeper Credential Collector
Created: May 30, 2018
module
Explore
Memcached Extractor
Created: May 30, 2018
module
Explore
Shodan Honeyscore Client
Created: May 30, 2018
module
Explore
SolarWinds Serv-U Unauthenticated Arbitrary File Read
Created: June 19, 2024
module
Explore
Windows Secrets Dump
Created: September 30, 2020
module
Explore
CouchDB Login Utility
Created: May 30, 2018
module
Explore
DFSCoerce
Created: July 16, 2022
module
Explore
Microsoft Windows Deployment Services Unattend Retrieval
Created: May 30, 2018
module
Explore
DECT Call Scanner
Created: May 30, 2018
module
Explore
DECT Base Station Scanner
Created: May 30, 2018
module
Explore
Gopher gophermap Scanner
Created: June 14, 2018
module
Explore