A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 01 - 20 of 202,678 in total
Google Chrome Vulnerability: CVE-2024-11111 Inappropriate implementation in Autofill
Published: November 13, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-11113 Use after free in Accessibility
Published: November 13, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-11114 Inappropriate implementation in Views
Published: November 13, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-11110 Inappropriate implementation in Blink
Published: November 13, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-11115 Insufficient policy enforcement in Navigation
Published: November 13, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-11117 Inappropriate implementation in FileSystem
Published: November 13, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-11116 Inappropriate implementation in Paint
Published: November 13, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-11112 Use after free in Media
Published: November 13, 2024 | Severity: 4
vulnerability
Explore
Microsoft Windows: CVE-2024-49039: Windows Task Scheduler Elevation of Privilege Vulnerability
Published: November 12, 2024 | Severity: 4
vulnerability
Explore
Microsoft Windows: CVE-2024-43636: Win32k Elevation of Privilege Vulnerability
Published: November 12, 2024 | Severity: 4
vulnerability
Explore
Microsoft Windows: CVE-2024-43645: Windows Defender Application Control (WDAC) Security Feature Bypass Vulnerability
Published: November 12, 2024 | Severity: 4
vulnerability
Explore
Microsoft Windows: CVE-2024-43451: NTLM Hash Disclosure Spoofing Vulnerability
Published: November 12, 2024 | Severity: 4
vulnerability
Explore
Microsoft Windows: CVE-2024-43621: Windows Telephony Service Remote Code Execution Vulnerability
Published: November 12, 2024 | Severity: 4
vulnerability
Explore
Microsoft CVE-2024-49016: SQL Server Native Client Remote Code Execution Vulnerability
Published: November 12, 2024 | Severity: 9
vulnerability
Explore
Microsoft Windows: CVE-2024-43449: Windows USB Video Class System Driver Elevation of Privilege Vulnerability
Published: November 12, 2024 | Severity: 4
vulnerability
Explore
Microsoft Windows: CVE-2024-43624: Windows Hyper-V Shared Virtual Disk Elevation of Privilege Vulnerability
Published: November 12, 2024 | Severity: 4
vulnerability
Explore
Microsoft Windows: CVE-2024-43626: Windows Telephony Service Elevation of Privilege Vulnerability
Published: November 12, 2024 | Severity: 4
vulnerability
Explore
Microsoft Windows: CVE-2024-43637: Windows USB Video Class System Driver Elevation of Privilege Vulnerability
Published: November 12, 2024 | Severity: 4
vulnerability
Explore
Microsoft Exchange: CVE-2024-49040: Microsoft Exchange Server Spoofing Vulnerability
Published: November 12, 2024 | Severity: 4
vulnerability
Explore
Microsoft Office: CVE-2024-49031: Microsoft Office Graphics Remote Code Execution Vulnerability
Published: November 12, 2024 | Severity: 4
vulnerability
Explore