A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,601 - 3,620 of 5,809 in total
MS17-010 SMB RCE Detection
Created: May 30, 2018
module
Explore
Cambium ePMP 1000 SNMP Enumeration
Created: June 14, 2018
module
Explore
HP LaserJet Printer SNMP Enumeration
Created: May 30, 2018
module
Explore
SSH Public Key Acceptance Scanner
Created: May 30, 2018
module
Explore
SSH Version Scanner
Created: May 30, 2018
module
Explore
Varnish Cache CLI File Read
Created: June 14, 2018
module
Explore
VMWare ESX/ESXi Fingerprint Scanner
Created: May 30, 2018
module
Explore
VMWare Web Login Scanner
Created: May 30, 2018
module
Explore
VMWare Screenshot Stealer
Created: May 30, 2018
module
Explore
Apple Remote Desktop Root Vulnerability
Created: June 14, 2018
module
Explore
Android Mercury Browser Intent URI Scheme and Directory Traversal Vulnerability
Created: May 30, 2018
module
Explore
Authentication Capture: FTP
Created: May 30, 2018
module
Explore
Printjob Capture Service
Created: May 30, 2018
module
Explore
ICMP Exfiltration Service
Created: May 30, 2018
module
Explore
PXE Boot Exploit Server
Created: May 30, 2018
module
Explore
Regsvr32.exe (.sct) Command Delivery Server
Created: May 30, 2018
module
Explore
ESC8 Relay: SMB to HTTP(S)
Created: November 06, 2024
module
Explore
SOCKS Proxy Server
Created: September 23, 2020
module
Explore
mDNS Spoofer
Created: May 30, 2018
module
Explore
Alpha2 Alphanumeric Mixedcase Encoder
Created: May 30, 2018
module
Explore