A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 01 - 20 of 155,203 in total
Google Chrome Vulnerability: CVE-2024-5834 Inappropriate implementation in Dawn
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5844 Heap buffer overflow in Tab Strip
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5847 Use after free in PDFium
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5835 Heap buffer overflow in Tab Groups
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5842 Use after free in Browser UI
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5843 Inappropriate implementation in Downloads
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5836 Inappropriate Implementation in DevTools
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5830 Type Confusion in V8
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5837 Type Confusion in V8
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5839 Inappropriate Implementation in Memory Allocator
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
SUSE: CVE-2024-5742: SUSE Linux Security Advisory
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5838 Type Confusion in V8
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5840 Policy Bypass in CORS
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5832 Use after free in Dawn
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5833 Type Confusion in V8
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5845 Use after free in Audio
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5831 Use after free in Dawn
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5841 Use after free in V8
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5846 Use after free in PDFium
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Microsoft Windows: CVE-2024-30087: Win32k Elevation of Privilege Vulnerability
Published: June 11, 2024 | Severity: 4
vulnerability
Explore