A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 14,741 - 14,760 of 174,299 in total
Microsoft Edge Chromium: CVE-2023-5485 Inappropriate implementation in Autofill
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2023-5484 Inappropriate implementation in Navigation
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2023-5483 Inappropriate implementation in Intents
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2023-5481 Inappropriate implementation in Downloads
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2023-5479 Inappropriate implementation in Extensions API
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2023-5478 Inappropriate implementation in Autofill
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2023-5477 Inappropriate implementation in Installer
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2023-5476 Use after free in Blink History
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
FreeBSD: (Multiple Advisories) (CVE-2023-5218): electron{25,26} -- Use after free in Site Isolation
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
Ubuntu: (Multiple Advisories) (CVE-2023-44981): ZooKeeper vulnerabilities
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
SUSE: CVE-2023-5481: SUSE Linux Security Advisory
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
SUSE: CVE-2023-5478: SUSE Linux Security Advisory
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
SUSE: CVE-2023-5475: SUSE Linux Security Advisory
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
SUSE: CVE-2023-5474: SUSE Linux Security Advisory
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
SUSE: CVE-2023-5218: SUSE Linux Security Advisory
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
Huawei EulerOS: CVE-2023-5535: vim security update
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
Ubuntu: (Multiple Advisories) (CVE-2023-39325): Go vulnerabilities
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
Juniper Junos OS: 2023-10 Security Bulletin: Junos OS and Junos OS Evolved: A local attacker can retrieve sensitive information and elevate privileges on the device to an authorized user. (JSA73167) (CVE-2023-44201)
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
Ubuntu: (Multiple Advisories) (CVE-2023-38545): curl vulnerabilities
Published: October 11, 2023 | Severity: 4
vulnerability
Explore
Juniper Junos OS: 2023-10 Security Bulletin: Junos OS: An unauthenticated attacker with local access to the device can create a backdoor with root privileges (JSA73158) (CVE-2023-44194)
Published: October 11, 2023 | Severity: 5
vulnerability
Explore