A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 01 - 20 of 223,394 in total
Google Chrome Vulnerability: CVE-2025-0995 Use after free in V8
Published: February 13, 2025 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2025-0996 Inappropriate implementation in Browser UI
Published: February 13, 2025 | Severity: 4
vulnerability
Explore
PostgreSQL: CVE-2025-1094: PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation
Published: February 13, 2025 | Severity: 9
vulnerability
Explore
Google Chrome Vulnerability: CVE-2025-0997 Use after free in Navigation
Published: February 13, 2025 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2025-0998 Out of bounds memory access in V8
Published: February 13, 2025 | Severity: 4
vulnerability
Explore
PAN-OS: Unauthenticated File Deletion Vulnerability on the Management Web Interface
Published: February 12, 2025 | Severity: 4
vulnerability
Explore
PAN-OS: Authentication Bypass in the Management Web Interface
Published: February 12, 2025 | Severity: 4
vulnerability
Explore
Ivanti Pulse Connect Secure: February Security Advisory Ivanti Connect Secure (ICS),Ivanti Policy Secure (IPS) and Ivanti Secure Access Client (ISAC) (Multiple CVEs)
Published: February 12, 2025 | Severity: 8
vulnerability
Explore
PAN-OS: Authenticated File Read Vulnerability in the Management Web Interface
Published: February 12, 2025 | Severity: 4
vulnerability
Explore
Microsoft Windows: CVE-2025-21337: Windows NTFS Elevation of Privilege Vulnerability
Published: February 11, 2025 | Severity: 1
vulnerability
Explore
Adobe Illustrator: CVE-2025-21160: Security updates available for Adobe Illustrator (APSB25-11)
Published: February 11, 2025 | Severity: 7
vulnerability
Explore
Microsoft Windows: CVE-2025-21325: Windows Secure Kernel Mode Elevation of Privilege Vulnerability
Published: February 11, 2025 | Severity: 6
vulnerability
Explore
Microsoft Windows: CVE-2025-21379: DHCP Client Service Remote Code Execution Vulnerability
Published: February 11, 2025 | Severity: 6
vulnerability
Explore
Microsoft Windows: CVE-2025-21391: Windows Storage Elevation of Privilege Vulnerability
Published: February 11, 2025 | Severity: 6
vulnerability
Explore
Microsoft Windows: CVE-2025-21375: Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
Published: February 11, 2025 | Severity: 6
vulnerability
Explore
Microsoft Windows: CVE-2025-21376: Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Published: February 11, 2025 | Severity: 9
vulnerability
Explore
Microsoft SharePoint: CVE-2025-21400: Microsoft SharePoint Server Remote Code Execution Vulnerability
Published: February 11, 2025 | Severity: 8
vulnerability
Explore
Microsoft Windows: CVE-2025-21352: Internet Connection Sharing (ICS) Denial of Service Vulnerability
Published: February 11, 2025 | Severity: 6
vulnerability
Explore
Microsoft Windows: CVE-2025-21414: Windows Core Messaging Elevation of Privileges Vulnerability
Published: February 11, 2025 | Severity: 6
vulnerability
Explore
Microsoft Windows: CVE-2025-21201: Windows Telephony Server Remote Code Execution Vulnerability
Published: February 11, 2025 | Severity: 9
vulnerability
Explore