A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 01 - 20 of 159,963 in total
Cisco Catalyst SD-WAN Obsolete Version
Published: September 30, 2024 | Severity: 9
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6996 Race in Frames
Published: July 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6999 Inappropriate implementation in FedCM
Published: July 24, 2024 | Severity: 4
vulnerability
Explore
ISC BIND: BIND's database will be slow if a very large number of RRs exist at the same name (CVE-2024-1737)
Published: July 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6998 Use after free in User Education
Published: July 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-7005 Insufficient validation of untrusted input in Safe Browsing
Published: July 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6997 Use after free in Tabs
Published: July 24, 2024 | Severity: 4
vulnerability
Explore
ISC BIND: Assertion failure when serving both stale cache data and authoritative zone content (CVE-2024-4076)
Published: July 24, 2024 | Severity: 4
vulnerability
Explore
Gentoo Linux: GLSA 202407-28: Freenet: Deanonymization Vulnerability
Published: July 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6989 Use after free in Loader
Published: July 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-7000 Use after free in CSS
Published: July 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-7001 Inappropriate implementation in HTML
Published: July 24, 2024 | Severity: 4
vulnerability
Explore
ISC BIND: A flood of DNS messages over TCP may make the server unstable (CVE-2024-0760)
Published: July 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6988 Use after free in Downloads
Published: July 24, 2024 | Severity: 4
vulnerability
Explore
ISC BIND: SIG(0) can be used to exhaust CPU resources (CVE-2024-1975)
Published: July 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6993 Inappropriate implementation in Canvas
Published: July 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6995 Inappropriate implementation in Fullscreen
Published: July 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6991 Use after free in Dawn
Published: July 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6992 Out of bounds memory access in ANGLE
Published: July 24, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-6994 Heap buffer overflow in Layout
Published: July 24, 2024 | Severity: 4
vulnerability
Explore