A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 01 - 20 of 200,073 in total
Microsoft Edge Chromium: CVE-2024-43580
Published: October 18, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-43566
Published: October 18, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-49023
Published: October 18, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-43596
Published: October 18, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-43579
Published: October 18, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-43578
Published: October 18, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-43595
Published: October 18, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-43587
Published: October 18, 2024 | Severity: 4
vulnerability
Explore
Debian: CVE-2024-47674: linux -- security update
Published: October 17, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9955 Use after free in Web Authentication
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9961 Use after free in Parcel Tracking
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Apple Safari security update for CVE-2024-44185
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9964 Inappropriate implementation in Payments
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Apache Solr: CVE-2024-45217: Apache Solr: ConfigSets created during a backup restore command are trusted implicitly
Published: October 16, 2024 | Severity: 8
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9954 Use after free in AI
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Apple Safari security update for CVE-2024-44206
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9958 Inappropriate implementation in PictureInPicture
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9960 Use after free in Dawn
Published: October 16, 2024 | Severity: 4
vulnerability
Explore
Apache Solr: CVE-2024-45216: Apache Solr: Authentication bypass possible using a fake URL Path ending
Published: October 16, 2024 | Severity: 10
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9963 Insufficient data validation in Downloads
Published: October 16, 2024 | Severity: 4
vulnerability
Explore