A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 4,421 - 4,440 of 5,810 in total
Bookmarked Sites Retriever
Created: May 14, 2022
module
Explore
Windows Manage Webcam
Created: May 30, 2018
module
Explore
AD Computer, Group and Recursive User Membership to Local SQLite DB
Created: May 30, 2018
module
Explore
Windows Manage Create Shadow Copy
Created: May 30, 2018
module
Explore
TFTP Fetch, Linux Read File
Created: June 15, 2023
module
Explore
HTTP Fetch, Windows x64 Reverse HTTP Stager (wininet)
Created: May 18, 2023
module
Explore
Windows shellcode stage, Windows x64 Reverse HTTPS Stager (winhttp)
Created: September 08, 2022
module
Explore
VyOS Gather Device General Information
Created: September 28, 2020
module
Explore
Cambium cnPilot r200/r201 Command Execution as 'root'
Created: June 14, 2018
module
Explore
Iomega StorCenter Pro NAS Web Authentication Bypass
Created: May 30, 2018
module
Explore
JBoss JMX Console DeploymentFileRepository WAR Upload and Deployment
Created: May 30, 2018
module
Explore
Novell File Reporter Agent Arbitrary File Delete
Created: May 30, 2018
module
Explore
Kerberos ticket converter
Created: January 27, 2023
module
Explore
Microsoft SQL Server NTLM Stealer
Created: May 30, 2018
module
Explore
Password Cracker: OSX
Created: November 08, 2019
module
Explore
Kubernetes Enumeration
Created: October 28, 2021
module
Explore
Tautulli v2.1.9 - Shutdown Denial of Service
Created: March 19, 2020
module
Explore
WordPress Traversal Directory DoS
Created: May 30, 2018
module
Explore
SSH Key Exchange Init Corruption
Created: May 30, 2018
module
Explore
Windows Manage Memory Payload Injection Module
Created: May 30, 2018
module
Explore