A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 1,001 - 1,020 of 214,120 in total
Oracle MySQL Vulnerability: CVE-2024-21200
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Amazon Linux AMI 2: CVE-2024-21208: Security patch for java-1.8.0-amazon-corretto, java-11-amazon-corretto, java-17-amazon-corretto (Multiple Advisories)
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Oracle MySQL Vulnerability: CVE-2024-21243
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Debian: CVE-2024-21210: openjdk-11, openjdk-17 -- security update
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-9966 Inappropriate implementation in Navigations
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Debian: CVE-2024-9955: chromium -- security update
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-9961 Use after free in Parcel Tracking
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Amazon Linux AMI 2: CVE-2024-21235: Security patch for java-1.8.0-amazon-corretto, java-11-amazon-corretto, java-17-amazon-corretto (Multiple Advisories)
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Red Hat: CVE-2024-21208: JDK: HTTP client improper handling of maxHeaderSize (8328286) (Multiple Advisories)
Published: October 15, 2024 | Severity: 3
vulnerability
Explore
Red Hat: CVE-2024-21217: JDK: Unbounded allocation leads to out-of-memory error (8331446) (Multiple Advisories)
Published: October 15, 2024 | Severity: 3
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-9958 Inappropriate implementation in PictureInPicture
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-9960 Use after free in Dawn
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-9959 Use after free in DevTools
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Oracle E-Business Suite: CVE-2024-21267: Critical Patch Update
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Ubuntu: (CVE-2024-21207): mysql-8.0 vulnerability
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Java CPU October 2024 Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition vulnerability (CVE-2024-21208)
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Ubuntu: USN-7102-1 (CVE-2024-21241): MySQL vulnerabilities
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Debian: CVE-2024-9962: chromium -- security update
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Oracle E-Business Suite: CVE-2024-21280: Critical Patch Update
Published: October 15, 2024 | Severity: 4
vulnerability
Explore
Oracle E-Business Suite: CVE-2024-21282: Critical Patch Update
Published: October 15, 2024 | Severity: 4
vulnerability
Explore