A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 01 - 20 of 165,712 in total
Cisco Catalyst SD-WAN Obsolete Version
Published: 9月 30, 2024 | Severity: 9
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6996 Race in Frames
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore
ISC BIND: SIG(0) can be used to exhaust CPU resources (CVE-2024-1975)
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore
ISC BIND: BIND's database will be slow if a very large number of RRs exist at the same name (CVE-2024-1737)
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6999 Inappropriate implementation in FedCM
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6993 Inappropriate implementation in Canvas
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6994 Heap buffer overflow in Layout
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6992 Out of bounds memory access in ANGLE
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6995 Inappropriate implementation in Fullscreen
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-7005 Insufficient validation of untrusted input in Safe Browsing
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6998 Use after free in User Education
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-7001 Inappropriate implementation in HTML
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore
ISC BIND: A flood of DNS messages over TCP may make the server unstable (CVE-2024-0760)
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-7000 Use after free in CSS
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6997 Use after free in Tabs
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore
Gentoo Linux: GLSA 202407-28: Freenet: Deanonymization Vulnerability
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-7003 Inappropriate implementation in FedCM
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-7004 Insufficient validation of untrusted input in Safe Browsing
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore
ISC BIND: Assertion failure when serving both stale cache data and authoritative zone content (CVE-2024-4076)
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6988 Use after free in Downloads
Published: 7月 24, 2024 | Severity: 4
vulnerability
Explore