Vulnerability & Exploit Database

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 140,000 vulnerabilities and 3,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 1,321 - 1,340 of 4,285 in total
Kloxo Local Privilege Escalation
Disclosed: September 18, 2012
module
Explore
ZEN Load Balancer Filelog Command Execution
Disclosed: September 14, 2012
module
Explore
MS12-063 Microsoft Internet Explorer execCommand Use-After-Free Vulnerability
Disclosed: September 14, 2012
module
Explore
Auxilium RateMyPet Arbitrary File Upload Vulnerability
Disclosed: September 14, 2012
module
Explore
Webmin edit_html.cgi file Parameter Traversal Arbitrary File Access
Disclosed: September 06, 2012
module
Explore
Webmin /file/show.cgi Remote Command Execution
Disclosed: September 06, 2012
module
Explore
Openfiler v2.x NetworkCard Command Execution
Disclosed: September 04, 2012
module
Explore
QNX qconn Command Execution
Disclosed: September 04, 2012
module
Explore
QNX qconn Command Execution
Disclosed: September 04, 2012
module
Explore
HP System Management Anonymous Access Code Execution
Disclosed: September 01, 2012
module
Explore
HP SiteScope Remote Code Execution
Disclosed: August 29, 2012
module
Explore
EMC Networker Format String
Disclosed: August 29, 2012
module
Explore
HP Intelligent Management Center UAM Buffer Overflow
Disclosed: August 29, 2012
module
Explore
HP Application Lifecycle Management XGO.ocx ActiveX SetShapeNodeType() Remote Code Execution
Disclosed: August 29, 2012
module
Explore
ActiveFax (ActFax) 4.3 Client Importer Buffer Overflow
Disclosed: August 28, 2012
module
Explore
Symantec Messaging Gateway 9.5 Default SSH Password Vulnerability
Disclosed: August 27, 2012
module
Explore
Java 7 Applet Remote Code Execution
Disclosed: August 26, 2012
module
Explore
XODA 0.4.5 Arbitrary PHP File Upload Vulnerability
Disclosed: August 21, 2012
module
Explore
Authenticated WMI Exec via Powershell
Disclosed: August 19, 2012
module
Explore
E-Mail Security Virtual Appliance learn-msg.cgi Command Injection
Disclosed: August 16, 2012
module
Explore