A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 01 - 20 of 212,488 in total
Google Chrome Vulnerability: CVE-2025-0439 Race in Frames
Published: January 15, 2025 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2025-0440 Inappropriate implementation in Fullscreen
Published: January 15, 2025 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2025-0438 Stack buffer overflow in Tracing
Published: January 15, 2025 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2025-0437 Out of bounds read in Metrics
Published: January 15, 2025 | Severity: 4
vulnerability
Explore
Amazon Linux AMI 2: CVE-2024-12086: Security patch for rsync (ALAS-2025-2730)
Published: January 15, 2025 | Severity: 4
vulnerability
Explore
Amazon Linux AMI 2: CVE-2024-12088: Security patch for rsync (ALAS-2025-2730)
Published: January 15, 2025 | Severity: 4
vulnerability
Explore
Amazon Linux AMI 2: CVE-2024-12747: Security patch for rsync (ALAS-2025-2730)
Published: January 15, 2025 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2025-0448 Inappropriate implementation in Compositing
Published: January 15, 2025 | Severity: 4
vulnerability
Explore
Amazon Linux AMI 2: CVE-2024-12085: Security patch for rsync (ALAS-2025-2730)
Published: January 15, 2025 | Severity: 4
vulnerability
Explore
Amazon Linux AMI 2: CVE-2024-12087: Security patch for rsync (ALAS-2025-2730)
Published: January 15, 2025 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2025-0436 Integer overflow in Skia
Published: January 15, 2025 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2025-0446 Inappropriate implementation in Extensions
Published: January 15, 2025 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2025-0434 Out of bounds memory access in V8
Published: January 15, 2025 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2025-0447 Inappropriate implementation in Navigation
Published: January 15, 2025 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2025-0435 Inappropriate implementation in Navigation
Published: January 15, 2025 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2025-0442 Inappropriate implementation in Payments
Published: January 15, 2025 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2025-0443 Insufficient data validation in Extensions
Published: January 15, 2025 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2025-0441 Inappropriate implementation in Fenced Frames
Published: January 15, 2025 | Severity: 4
vulnerability
Explore
Microsoft Windows: CVE-2024-49105: Remote Desktop Client Remote Code Execution Vulnerability
Published: January 14, 2025 | Severity: 8
vulnerability
Explore
Microsoft Windows: CVE-2025-21237: Windows Telephony Service Remote Code Execution Vulnerability
Published: January 14, 2025 | Severity: 9
vulnerability
Explore