Vulnerability & Exploit Database

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. These vulnerabilities are utilized by our vulnerability management tool InsightVM. The exploits are all included in the Metasploit framework and utilized by our penetration testing tool, Metasploit Pro. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

十大赌博正规信誉网址 21 - 40 of 149,129 in total
OS X update for WindowServer (CVE-2023-42858)
Published: February 19, 2024 | Severity: 4
vulnerability
Explore
OS X update for Pro Res (CVE-2023-42873)
Published: February 19, 2024 | Severity: 4
vulnerability
Explore
OS X update for PackageKit (CVE-2023-42860)
Published: February 19, 2024 | Severity: 4
vulnerability
Explore
Gentoo Linux: CVE-2023-42117: Exim: Multiple Vulnerabilities
Published: February 18, 2024 | Severity: 4
vulnerability
Explore
Gentoo Linux: CVE-2023-42116: Exim: Multiple Vulnerabilities
Published: February 18, 2024 | Severity: 4
vulnerability
Explore
Gentoo Linux: CVE-2023-42119: Exim: Multiple Vulnerabilities
Published: February 18, 2024 | Severity: 4
vulnerability
Explore
Gentoo Linux: CVE-2023-42114: Exim: Multiple Vulnerabilities
Published: February 18, 2024 | Severity: 4
vulnerability
Explore
Gentoo Linux: CVE-2023-42115: Exim: Multiple Vulnerabilities
Published: February 18, 2024 | Severity: 4
vulnerability
Explore
SUSE: CVE-2024-22232: SUSE Linux Security Advisory
Published: February 16, 2024 | Severity: 4
vulnerability
Explore
SUSE: CVE-2024-22231: SUSE Linux Security Advisory
Published: February 16, 2024 | Severity: 4
vulnerability
Explore
ISC BIND: Querying RFC 1918 reverse zones may cause an assertion failure when nxdomain-redirect is enabled (CVE-2023-5517)
Published: February 15, 2024 | Severity: 4
vulnerability
Explore
ISC BIND: Specific recursive query patterns may lead to an out-of-memory condition (CVE-2023-6516)
Published: February 15, 2024 | Severity: 4
vulnerability
Explore
Ubuntu: (Multiple Advisories) (CVE-2023-48733): EDK II vulnerabilities
Published: February 15, 2024 | Severity: 4
vulnerability
Explore
ISC BIND: Enabling both DNS64 and serve-stale may cause an assertion failure during recursive resolution (CVE-2023-5679)
Published: February 15, 2024 | Severity: 4
vulnerability
Explore
Nginx: Use-after-free in HTTP/3 (CVE-2024-24990)
Published: February 15, 2024 | Severity: 4
vulnerability
Explore
Nginx: NULL pointer dereference in HTTP/3 (CVE-2024-24989)
Published: February 15, 2024 | Severity: 4
vulnerability
Explore
ISC BIND: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868)
Published: February 15, 2024 | Severity: 4
vulnerability
Explore
ISC BIND: Cleaning an ECS-enabled cache may cause excessive CPU load (CVE-2023-5680)
Published: February 15, 2024 | Severity: 4
vulnerability
Explore
ISC BIND: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387)
Published: February 15, 2024 | Severity: 4
vulnerability
Explore
ISC BIND: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408)
Published: February 15, 2024 | Severity: 4
vulnerability
Explore