A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 01 - 20 of 221,373 in total
Ivanti Pulse Connect Secure: February Security Advisory Ivanti Connect Secure (ICS),Ivanti Policy Secure (IPS) and Ivanti Secure Access Client (ISAC) (Multiple CVEs)
Published: February 12, 2025 | Severity: 8
vulnerability
Explore
Microsoft Windows: CVE-2025-21377: NTLM Hash Disclosure Spoofing Vulnerability
Published: February 11, 2025 | Severity: 7
vulnerability
Explore
Microsoft Windows: CVE-2025-21182: Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability
Published: February 11, 2025 | Severity: 6
vulnerability
Explore
Microsoft Windows: CVE-2025-21352: Internet Connection Sharing (ICS) Denial of Service Vulnerability
Published: February 11, 2025 | Severity: 6
vulnerability
Explore
Microsoft Windows: CVE-2025-21190: Windows Telephony Service Remote Code Execution Vulnerability
Published: February 11, 2025 | Severity: 9
vulnerability
Explore
JetBrains TeamCity: CVE-2025-26493: Several DOM-based XSS were possible on the Code Inspection Report tab (TW-87505)
Published: February 11, 2025 | Severity: 5
vulnerability
Explore
Microsoft Windows: CVE-2025-21201: Windows Telephony Server Remote Code Execution Vulnerability
Published: February 11, 2025 | Severity: 9
vulnerability
Explore
Microsoft Office: CVE-2025-21386: Microsoft Excel Remote Code Execution Vulnerability
Published: February 11, 2025 | Severity: 6
vulnerability
Explore
Microsoft Windows: CVE-2025-21212: Internet Connection Sharing (ICS) Denial of Service Vulnerability
Published: February 11, 2025 | Severity: 6
vulnerability
Explore
Ivanti Pulse Connect Secure: February Security Advisory Ivanti Connect Secure (ICS),Ivanti Policy Secure (IPS) and Ivanti Secure Access Client (ISAC) (Multiple CVEs)
Published: February 11, 2025 | Severity: 8
vulnerability
Explore
Microsoft Windows: CVE-2025-21407: Windows Telephony Service Remote Code Execution Vulnerability
Published: February 11, 2025 | Severity: 9
vulnerability
Explore
Microsoft Office: CVE-2025-21390: Microsoft Excel Remote Code Execution Vulnerability
Published: February 11, 2025 | Severity: 6
vulnerability
Explore
Microsoft Windows: CVE-2025-21358: Windows Core Messaging Elevation of Privileges Vulnerability
Published: February 11, 2025 | Severity: 6
vulnerability
Explore
Microsoft Windows: CVE-2025-21369: Microsoft Digest Authentication Remote Code Execution Vulnerability
Published: February 11, 2025 | Severity: 9
vulnerability
Explore
Ivanti Pulse Connect Secure: February Security Advisory Ivanti Connect Secure (ICS),Ivanti Policy Secure (IPS) and Ivanti Secure Access Client (ISAC) (Multiple CVEs)
Published: February 11, 2025 | Severity: 4
vulnerability
Explore
Microsoft Office: CVE-2025-21397: Microsoft Office Remote Code Execution Vulnerability
Published: February 11, 2025 | Severity: 6
vulnerability
Explore
Microsoft Windows: CVE-2025-21183: Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability
Published: February 11, 2025 | Severity: 6
vulnerability
Explore
Microsoft Office: CVE-2025-21381: Microsoft Excel Remote Code Execution Vulnerability
Published: February 11, 2025 | Severity: 6
vulnerability
Explore
Ivanti Pulse Connect Secure: February Security Advisory Ivanti Connect Secure (ICS),Ivanti Policy Secure (IPS) and Ivanti Secure Access Client (ISAC) (Multiple CVEs)
Published: February 11, 2025 | Severity: 6
vulnerability
Explore
Microsoft Windows: CVE-2025-21391: Windows Storage Elevation of Privilege Vulnerability
Published: February 11, 2025 | Severity: 6
vulnerability
Explore