Vulnerability & Exploit Database

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 140,000 vulnerabilities and 3,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 61 - 80 of 163,101 in total
Red Hat OpenShift: CVE-2019-19335: openshift/installer: kubeconfig and kubeadmin-password are created with word-readable permissions
Published: February 13, 2020 | Severity: 4
vulnerability
Explore
OS X update for APFS (CVE-2019-8824)
Published: February 12, 2020 | Severity: 4
vulnerability
Explore
Apple iTunes security update for CVE-2019-8898
Published: February 12, 2020 | Severity: 4
vulnerability
Explore
Apple iTunes security update for CVE-2020-3864
Published: February 12, 2020 | Severity: 4
vulnerability
Explore
Atlassian JIRA: Cross-Site Request Forgery (CSRF) (CVE-2019-20098)
Published: February 12, 2020 | Severity: 7
vulnerability
Explore
Atlassian JIRA: Cross-Site Request Forgery (CSRF) (CVE-2019-20099)
Published: February 12, 2020 | Severity: 7
vulnerability
Explore
Apple Safari security update for CVE-2019-8898
Published: February 12, 2020 | Severity: 4
vulnerability
Explore
Red Hat: CVE-2020-6404: Important: chromium-browser security update (RHSA-2020:0514)
Published: February 11, 2020 | Severity: 5
vulnerability
Explore
Red Hat: CVE-2020-6395: Important: chromium-browser security update (RHSA-2020:0514)
Published: February 11, 2020 | Severity: 4
vulnerability
Explore
Red Hat: CVE-2020-6406: Important: chromium-browser security update (RHSA-2020:0514)
Published: February 11, 2020 | Severity: 9
vulnerability
Explore
Red Hat: CVE-2020-6405: Important: chromium-browser security update (RHSA-2020:0514)
Published: February 11, 2020 | Severity: 4
vulnerability
Explore
Red Hat: CVE-2020-6409: Important: chromium-browser security update (RHSA-2020:0514)
Published: February 11, 2020 | Severity: 7
vulnerability
Explore
MFSA2020-07 Thunderbird: Security Vulnerabilities fixed in Thunderbird 68.5 (CVE-2020-6800)
Published: February 11, 2020 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2020-6379
Published: February 11, 2020 | Severity: 7
vulnerability
Explore
Symantec Endpoint Protection: Improper Privilege Management (CVE-2020-5822)
Published: February 11, 2020 | Severity: 5
vulnerability
Explore
Symantec Endpoint Protection: Improper Privilege Management (CVE-2020-5823)
Published: February 11, 2020 | Severity: 5
vulnerability
Explore
Red Hat: CVE-2020-6410: Important: chromium-browser security update (RHSA-2020:0514)
Published: February 11, 2020 | Severity: 7
vulnerability
Explore
Google Chrome Vulnerability: CVE-2020-6387
Published: February 11, 2020 | Severity: 7
vulnerability
Explore
Google Chrome Vulnerability: CVE-2020-6415
Published: February 11, 2020 | Severity: 7
vulnerability
Explore
MFSA2020-07 Thunderbird: Security Vulnerabilities fixed in Thunderbird 68.5 (CVE-2020-6793)
Published: February 11, 2020 | Severity: 4
vulnerability
Explore