Vulnerability & Exploit Database

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 01 - 20 of 192,858 in total
PostgreSQL: CVE-2021-23214: Server processes unencrypted bytes from man-in-the-middle
Published: November 26, 2021 | Severity: 4
vulnerability
Explore
PostgreSQL: CVE-2021-23222: libpq processes unencrypted bytes from man-in-the-middle
Published: November 26, 2021 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2021-38020 Insufficient policy enforcement in contacts picker
Published: November 23, 2021 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2021-38014 Out of bounds write in Swiftshader
Published: November 23, 2021 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2021-38015 Inappropriate implementation in input
Published: November 23, 2021 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2021-38021 Inappropriate implementation in referrer
Published: November 23, 2021 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2021-38019 Insufficient policy enforcement in CORS
Published: November 23, 2021 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2021-38017 Insufficient policy enforcement in iframe sandbox
Published: November 23, 2021 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2021-38005 Use after free in loader
Published: November 23, 2021 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2021-38016 Insufficient policy enforcement in background fetch
Published: November 23, 2021 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2021-38018 Inappropriate implementation in navigation
Published: November 23, 2021 | Severity: 4
vulnerability
Explore
Microsoft Edge Microsoft Edge (Chromium): CVE-2021-38021 Inappropriate implementation in referrer
Published: November 23, 2021 | Severity: 4
vulnerability
Explore
Microsoft Edge Microsoft Edge (Chromium): CVE-2021-38005 Use after free in loader
Published: November 23, 2021 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2021-38006 Use after free in storage foundation
Published: November 23, 2021 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2021-38007 Type Confusion in V8
Published: November 23, 2021 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2021-38011 Use after free in storage foundation
Published: November 23, 2021 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2021-38022 Inappropriate implementation in WebAuthentication
Published: November 23, 2021 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2021-38008 Use after free in media
Published: November 23, 2021 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2021-38009 Inappropriate implementation in cache
Published: November 23, 2021 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2021-38012 Type Confusion in V8
Published: November 23, 2021 | Severity: 4
vulnerability
Explore