A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 961 - 980 of 214,120 in total
SolarWinds Serv-U: CVE-2024-45711: Directory Traversal Vulnerability in Serv-U
Published: October 16, 2024 | Severity: 9
vulnerability
Explore
Apache Solr: CVE-2024-45216: Apache Solr: Authentication bypass possible using a fake URL Path ending
Published: October 16, 2024 | Severity: 10
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9966 Inappropriate implementation in Navigations
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
IBM WebSphere Application Server: CVE-2024-45072: IBM WebSphere Application Server is vulnerable to an XML External Entity Injection (XXE) vulnerability (CVE-2024-45072)
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Apple Safari security update for CVE-2024-44185
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9963 Insufficient data validation in Downloads
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9954 Use after free in AI
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9960 Use after free in Dawn
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Debian: CVE-2024-9143: openssl -- security update
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Apple Safari security update for CVE-2024-44206
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9965 Insufficient data validation in DevTools
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9958 Inappropriate implementation in PictureInPicture
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9957 Use after free in UI
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9964 Inappropriate implementation in Payments
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Oracle MySQL Vulnerability: CVE-2024-21207
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Oracle WebLogic: CVE-2024-21260 : Critical Patch Update
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
FreeBSD: VID-851CE3E4-8B03-11EF-84E9-901B0E9408DC (CVE-2024-47779): element-web -- Potential exposure of access token via authenticated media
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Rocky Linux: CVE-2024-21208: java-21-openjdk (Multiple Advisories)
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Oracle MySQL Vulnerability: CVE-2024-21197
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Oracle E-Business Suite: CVE-2024-21252: Critical Patch Update
Published: October 15, 2024 | Severity: 4
vulnerability
Explore