Vulnerability & Exploit Database

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 01 - 20 of 208,597 in total
OS X update for libresolv (CVE-2022-32790)
Published: 6月 22, 2022 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2022-2158 Type Confusion in V8
Published: 6月 22, 2022 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2022-2162 Insufficient policy enforcement in File System API
Published: 6月 22, 2022 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2022-2157 Use after free in Interest groups
Published: 6月 22, 2022 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2022-2160 Insufficient policy enforcement in DevTools
Published: 6月 22, 2022 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2022-2164 Inappropriate implementation in Extensions API
Published: 6月 22, 2022 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2022-2165 Insufficient data validation in URL formatting
Published: 6月 22, 2022 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2022-2161 Use after free in WebApp Provider
Published: 6月 22, 2022 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2022-2163 Use after free in Cast UI and Toolbar
Published: 6月 22, 2022 | Severity: 4
vulnerability
Explore
OpenSSL The c_rehash script allows command injection (CVE-2022-2068)
Published: 6月 22, 2022 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2022-2156 Use after free in Base
Published: 6月 22, 2022 | Severity: 4
vulnerability
Explore
Debian: CVE-2022-1720: vim -- security update
Published: 6月 20, 2022 | Severity: 4
vulnerability
Explore
Debian: CVE-2022-2124: vim -- security update
Published: 6月 19, 2022 | Severity: 4
vulnerability
Explore
Debian: CVE-2022-2126: vim -- security update
Published: 6月 19, 2022 | Severity: 4
vulnerability
Explore
Centos Linux: CVE-2022-28733: Important: grub2, mokutil, shim, and shim-unsigned-x64 security update (Multiple Advisories)
Published: 6月 16, 2022 | Severity: 4
vulnerability
Explore
Red Hat: CVE-2021-3697: Important: grub2, mokutil, shim, and shim-unsigned-x64 security update (Multiple Advisories)
Published: 6月 16, 2022 | Severity: 4
vulnerability
Explore
Red Hat: CVE-2022-28733: Important: grub2, mokutil, shim, and shim-unsigned-x64 security update (Multiple Advisories)
Published: 6月 16, 2022 | Severity: 4
vulnerability
Explore
Centos Linux: CVE-2022-28737: Important: grub2, mokutil, shim, and shim-unsigned-x64 security update (Multiple Advisories)
Published: 6月 16, 2022 | Severity: 4
vulnerability
Explore
Centos Linux: CVE-2022-28736: Important: grub2, mokutil, shim, and shim-unsigned-x64 security update (Multiple Advisories)
Published: 6月 16, 2022 | Severity: 4
vulnerability
Explore
Huawei EulerOS: CVE-2022-1355: libtiff security update
Published: 6月 16, 2022 | Severity: 4
vulnerability
Explore