Vulnerability & Exploit Database

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 1,181 - 1,200 of 5,705 in total
WordPress Holding Pattern Theme Arbitrary File Upload
Disclosed: February 11, 2015
module
Explore
Netgear Unauthenticated SOAP Password Extractor
Disclosed: February 11, 2015
module
Explore
Maarch LetterBox Unrestricted File Upload
Disclosed: February 11, 2015
module
Explore
WordPress WPLMS Theme Privilege Escalation
Disclosed: February 09, 2015
module
Explore
Ektron 8.5, 8.7, 9.0 XSLT Transform Remote Code Execution
Disclosed: February 05, 2015
module
Explore
Adobe Flash Player ByteArray With Workers Use After Free
Disclosed: February 02, 2015
module
Explore
WordPress Ultimate CSV Importer User Table Extract
Disclosed: February 02, 2015
module
Explore
MS15-018 Microsoft Internet Explorer 10 and 11 Cross-Domain JavaScript Injection
Disclosed: February 01, 2015
module
Explore
X360 VideoPlayer ActiveX Control Buffer Overflow
Disclosed: January 30, 2015
module
Explore
ManageEngine Multiple Products Arbitrary File Download
Disclosed: January 28, 2015
module
Explore
ManageEngine Multiple Products Arbitrary Directory Listing
Disclosed: January 28, 2015
module
Explore
Oracle Weblogic Server Deserialization RCE - Raw Object
Disclosed: January 28, 2015
module
Explore
Exim GHOST (glibc gethostbyname) Buffer Overflow
Disclosed: January 27, 2015
module
Explore
Group Policy Script Execution From Shared Resource
Disclosed: January 26, 2015
module
Explore
WordPress Platform Theme File Upload Vulnerability
Disclosed: January 21, 2015
module
Explore
IPass Control Pipe Remote Command Execution
Disclosed: January 21, 2015
module
Explore
Oracle DB Privilege Escalation via Function-Based Index
Disclosed: January 21, 2015
module
Explore
Java Secure Socket Extension (JSSE) SKIP-TLS MITM Proxy
Disclosed: January 20, 2015
module
Explore
WordPress Pixabay Images PHP Code Upload
Disclosed: January 19, 2015
module
Explore
MS15-004 Microsoft Remote Desktop Services Web Proxy IE Sandbox Escape
Disclosed: January 13, 2015
module
Explore