A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 3,781 - 3,800 of 165,111 in total
Huawei EulerOS: CVE-2024-26901: kernel security update
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
Huawei EulerOS: CVE-2024-26894: kernel security update
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
FreeBSD: (Multiple Advisories) (CVE-2024-3837): qt5-webengine -- Multiple vulnerabilities
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
FreeBSD: (Multiple Advisories) (CVE-2024-3839): qt5-webengine -- Multiple vulnerabilities
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
Ubuntu: (Multiple Advisories) (CVE-2023-52644): Linux kernel vulnerabilities
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
Ubuntu: (Multiple Advisories) (CVE-2023-52643): Linux kernel vulnerabilities
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
Ubuntu: (Multiple Advisories) (CVE-2023-52642): Linux kernel vulnerabilities
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
FreeBSD: (Multiple Advisories) (CVE-2024-3914): qt5-webengine -- Multiple vulnerabilities
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-3839 Out of bounds read in Fonts
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-3844 Inappropriate implementation in Extensions
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-3846 Inappropriate implementation in Prompts
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
Huawei EulerOS: CVE-2024-26857: kernel security update
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
Huawei EulerOS: CVE-2024-26880: kernel security update
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
Debian: CVE-2024-26845: linux -- security update
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
Rocky Linux: CVE-2024-26892: kernel-rt (Multiple Advisories)
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
Rocky Linux: CVE-2024-26872: kernel-rt (Multiple Advisories)
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
Rocky Linux: CVE-2024-26906: kernel-rt (Multiple Advisories)
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
Rocky Linux: CVE-2024-26919: kernel-rt (Multiple Advisories)
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-3841 Insufficient data validation in Browser Switcher
Published: April 17, 2024 | Severity: 4
vulnerability
Explore
Debian: CVE-2024-26875: linux -- security update
Published: April 17, 2024 | Severity: 4
vulnerability
Explore