A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

pg电子 01 - 20 of 205,858 in total
Microsoft Edge Chromium: CVE-2024-43595
Published: 10月 18, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-43580
Published: 10月 18, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-43596
Published: 10月 18, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-49023
Published: 10月 18, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-43587
Published: 10月 18, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-43578
Published: 10月 18, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-43566
Published: 10月 18, 2024 | Severity: 4
vulnerability
Explore
Microsoft Edge Chromium: CVE-2024-43579
Published: 10月 18, 2024 | Severity: 4
vulnerability
Explore
Debian: CVE-2024-47674: linux -- security update
Published: 10月 17, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9963 Insufficient data validation in Downloads
Published: 10月 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9966 Inappropriate implementation in Navigations
Published: 10月 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9954 Use after free in AI
Published: 10月 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9961 Use after free in Parcel Tracking
Published: 10月 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9962 Inappropriate implementation in Permissions
Published: 10月 16, 2024 | Severity: 4
vulnerability
Explore
Apple Safari security update for CVE-2024-44206
Published: 10月 16, 2024 | Severity: 4
vulnerability
Explore
Apache Solr: CVE-2024-45216: Apache Solr: Authentication bypass possible using a fake URL Path ending
Published: 10月 16, 2024 | Severity: 10
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9957 Use after free in UI
Published: 10月 16, 2024 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9956 Inappropriate implementation in Web Authentication
Published: 10月 16, 2024 | Severity: 4
vulnerability
Explore
Apache Solr: CVE-2024-45217: Apache Solr: ConfigSets created during a backup restore command are trusted implicitly
Published: 10月 16, 2024 | Severity: 8
vulnerability
Explore
Google Chrome Vulnerability: CVE-2024-9959 Use after free in DevTools
Published: 10月 16, 2024 | Severity: 4
vulnerability
Explore