A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,601 - 3,620 of 214,216 in total
Microsoft Windows: CVE-2024-38199: Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability
Published: August 13, 2024 | Severity: 10
vulnerability
Explore
Microsoft Windows: CVE-2024-38178: Scripting Engine Memory Corruption Vulnerability
Published: August 13, 2024 | Severity: 8
vulnerability
Explore
Microsoft Office: CVE-2024-38200: Microsoft Office Spoofing Vulnerability
Published: August 13, 2024 | Severity: 4
vulnerability
Explore
Debian: CVE-2023-20584: amd64-microcode -- security update
Published: August 13, 2024 | Severity: 4
vulnerability
Explore
CVE-2024-38171: Microsoft PowerPoint Remote Code Execution Vulnerability NewRecently updated [Office for Mac]
Published: August 13, 2024 | Severity: 4
vulnerability
Explore
CVE-2024-38170: Microsoft Excel Remote Code Execution Vulnerability New [Office for Mac]
Published: August 13, 2024 | Severity: 4
vulnerability
Explore
Microsoft Windows: CVE-2024-38133: Windows Kernel Elevation of Privilege Vulnerability
Published: August 13, 2024 | Severity: 7
vulnerability
Explore
Microsoft Office: CVE-2024-38171: Microsoft PowerPoint Remote Code Execution Vulnerability
Published: August 13, 2024 | Severity: 4
vulnerability
Explore
Microsoft Office: CVE-2024-38169: Microsoft Office Visio Remote Code Execution Vulnerability
Published: August 13, 2024 | Severity: 4
vulnerability
Explore
Alma Linux: CVE-2023-31356: Important: linux-firmware security update (Multiple Advisories)
Published: August 13, 2024 | Severity: 4
vulnerability
Explore
FreeBSD: VID-9D8E9952-5A42-11EF-A219-1C697A616631 (CVE-2023-49141): Intel CPUs -- multiple vulnerabilities
Published: August 13, 2024 | Severity: 4
vulnerability
Explore
Alpine Linux: CVE-2024-38167: Vulnerability in Multiple Components
Published: August 13, 2024 | Severity: 7
vulnerability
Explore
Microsoft Windows: CVE-2022-2601: Redhat: CVE-2022-2601 grub2 - Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass
Published: August 13, 2024 | Severity: 4
vulnerability
Explore
Red Hat: CVE-2023-31356: kernel: hw: amd:Incomplete system memory cleanup in SEV firmware corrupt guest private memory (Multiple Advisories)
Published: August 13, 2024 | Severity: 4
vulnerability
Explore
Microsoft Windows: CVE-2024-38138: Windows Deployment Services Remote Code Execution Vulnerability
Published: August 13, 2024 | Severity: 9
vulnerability
Explore
Microsoft Windows: CVE-2024-38215: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Published: August 13, 2024 | Severity: 7
vulnerability
Explore
Microsoft Windows: CVE-2024-38155: Security Center Broker Information Disclosure Vulnerability
Published: August 13, 2024 | Severity: 5
vulnerability
Explore
Microsoft Windows: CVE-2024-38165: Windows Compressed Folder Tampering Vulnerability
Published: August 13, 2024 | Severity: 7
vulnerability
Explore
Microsoft Windows: CVE-2024-38184: Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Published: August 13, 2024 | Severity: 7
vulnerability
Explore
Microsoft Windows: CVE-2024-38160: Windows Network Virtualization Remote Code Execution Vulnerability
Published: August 13, 2024 | Severity: 8
vulnerability
Explore