A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 181 - 200 of 206,591 in total
Google Chrome Vulnerability: CVE-2024-9963 Insufficient data validation in Downloads
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9966 Inappropriate implementation in Navigations
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9956 Inappropriate implementation in Web Authentication
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
FreeBSD: VID-C6F4177C-8E29-11EF-98E7-84A93843EB75 (CVE-2024-9143): OpenSSL -- OOB memory access vulnerability
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9964 Inappropriate implementation in Payments
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9965 Insufficient data validation in DevTools
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9957 Use after free in UI
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9959 Use after free in DevTools
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Debian: CVE-2022-4973: wordpress -- security update
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Apple Safari security update for CVE-2024-44185
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9955 Use after free in Web Authentication
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Apache Solr: CVE-2024-45217: Apache Solr: ConfigSets created during a backup restore command are trusted implicitly
Published: October 16, 2024 | Severity: 8
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9954 Use after free in AI
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9960 Use after free in Dawn
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9961 Use after free in Parcel Tracking
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9958 Inappropriate implementation in PictureInPicture
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Apache Solr: CVE-2024-45216: Apache Solr: Authentication bypass possible using a fake URL Path ending
Published: October 16, 2024 | Severity: 10
vulnerability
Explore
Oracle MySQL Vulnerability: CVE-2024-21237
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Oracle MySQL Vulnerability: CVE-2024-21262
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Oracle MySQL Vulnerability: CVE-2024-21231
Published: October 15, 2024 | Severity: 4
vulnerability
Explore