A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 2,401 - 2,420 of 171,268 in total
Alma Linux: CVE-2024-2698: Important: ipa security update (ALSA-2024-3754)
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Alma Linux: CVE-2024-3183: Important: ipa security update (ALSA-2024-3754)
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5831 Use after free in Dawn
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5839 Inappropriate Implementation in Memory Allocator
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5837 Type Confusion in V8
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5847 Use after free in PDFium
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5836 Inappropriate Implementation in DevTools
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5846 Use after free in PDFium
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5845 Use after free in Audio
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5838 Type Confusion in V8
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5835 Heap buffer overflow in Tab Groups
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5844 Heap buffer overflow in Tab Strip
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5841 Use after free in V8
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5840 Policy Bypass in CORS
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5830 Type Confusion in V8
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Red Hat: CVE-2024-2698: freeipa: delegation rules allow a proxy service to impersonate any user to access another target service (Multiple Advisories)
Published: June 12, 2024 | Severity: 8
vulnerability
Explore
Amazon Linux AMI 2: CVE-2024-5742: Security patch for nano (ALAS-2024-2590)
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Debian: CVE-2024-5742: nano -- security update
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5843 Inappropriate implementation in Downloads
Published: June 12, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-5834 Inappropriate implementation in Dawn
Published: June 12, 2024 | Severity: 4
vulnerability
Explore