Vulnerability & Exploit Database

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 8,221 - 8,240 of 155,548 in total
Google Chrome Vulnerability: CVE-2023-4354 Heap buffer overflow in Skia
Published: August 15, 2023 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2023-4349 Use after free in Device Trust Connectors
Published: August 15, 2023 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2023-4361 Inappropriate implementation in Autofill
Published: August 15, 2023 | Severity: 4
vulnerability
Explore
SUSE: CVE-2023-2312: SUSE Linux Security Advisory
Published: August 15, 2023 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2023-4355 Out of bounds memory access in V8
Published: August 15, 2023 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2023-4364 Inappropriate implementation in Permission Prompts
Published: August 15, 2023 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2023-4366 Use after free in Extensions
Published: August 15, 2023 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2023-4352 Type Confusion in V8
Published: August 15, 2023 | Severity: 4
vulnerability
Explore
SUSE: CVE-2023-4363: SUSE Linux Security Advisory
Published: August 15, 2023 | Severity: 4
vulnerability
Explore
SUSE: CVE-2023-4365: SUSE Linux Security Advisory
Published: August 15, 2023 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2023-4351 Use after free in Network
Published: August 15, 2023 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2023-2312 Use after free in Offline
Published: August 15, 2023 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2023-4350 Inappropriate implementation in Fullscreen
Published: August 15, 2023 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2023-4356 Use after free in Audio
Published: August 15, 2023 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2023-4359 Inappropriate implementation in App Launcher
Published: August 15, 2023 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2023-4360 Inappropriate implementation in Color
Published: August 15, 2023 | Severity: 4
vulnerability
Explore
Oracle Linux: (CVE-2023-32006) (Multiple Advisories): nodejs security and bug fix update
Published: August 15, 2023 | Severity: 4
vulnerability
Explore
Red Hat: CVE-2023-32006: Permissions policies can impersonate other modules in using module.constructor.createRequire() (Multiple Advisories)
Published: August 15, 2023 | Severity: 4
vulnerability
Explore
Red Hat: CVE-2023-40283: kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c (Multiple Advisories)
Published: August 14, 2023 | Severity: 7
vulnerability
Explore
Ubuntu: (Multiple Advisories) (CVE-2023-21264): Linux kernel vulnerabilities
Published: August 14, 2023 | Severity: 4
vulnerability
Explore