Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 1,061 - 1,080 of 261,995 in total
Microsoft Windows: CVE-2025-26677: Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
Published: May 13, 2025 | Severity: 7
vulnerability
Explore
Adobe Animate: CVE-2025-30328: Security updates available for Adobe Animate (APSB25-42)
Published: May 13, 2025 | Severity: 7
vulnerability
Explore
Ubuntu: USN-7535-1 (CVE-2025-20054): Intel Microcode vulnerabilities
Published: May 13, 2025 | Severity: 5
vulnerability
Explore
Microsoft Windows: CVE-2025-29830: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Published: May 13, 2025 | Severity: 7
vulnerability
Explore
Oracle Linux: CVE-2024-28956: ELSA-2025-20318: Unbreakable Enterprise kernel security update (IMPORTANT) (Multiple Advisories)
Published: May 13, 2025 | Severity: 4
vulnerability
Explore
Debian: CVE-2024-4981: pagure -- security update
Published: May 12, 2025 | Severity: 5
vulnerability
Explore
WordPress Plugin: b2i-investor-tools: CVE-2025-47458: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Published: May 12, 2025 | Severity: 7
vulnerability
Explore
VMware VMware Tools: CVE-2025-22247: VMware Tools update addresses an insecure file handling vulnerability
Published: May 12, 2025 | Severity: 5
vulnerability
Explore
WordPress Plugin: profilegrid-user-profiles-groups-and-communities: CVE-2025-47478: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Published: May 12, 2025 | Severity: 8
vulnerability
Explore
Amazon Linux 2023: CVE-2025-22247: Medium priority package update for open-vm-tools
Published: May 12, 2025 | Severity: 5
vulnerability
Explore
Red Hat: CVE-2025-31205: webkitgtk: A malicious website may exfiltrate data cross-origin (Multiple Advisories)
Published: May 12, 2025 | Severity: 8
vulnerability
Explore
Amazon Linux AMI 2: CVE-2025-22247: Security patch for open-vm-tools (ALAS-2025-2864)
Published: May 12, 2025 | Severity: 5
vulnerability
Explore
WordPress Plugin: frontend-dashboard: CVE-2025-4474: Improper Authorization
Published: May 12, 2025 | Severity: 9
vulnerability
Explore
WordPress Plugin: frontend-dashboard: CVE-2025-4473: Improper Authorization
Published: May 12, 2025 | Severity: 9
vulnerability
Explore
WordPress Plugin: subaccounts-for-woocommerce: CVE-2025-47461: Authorization Bypass Through User-Controlled Key
Published: May 12, 2025 | Severity: 9
vulnerability
Explore
Red Hat: CVE-2025-31257: webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (Multiple Advisories)
Published: May 12, 2025 | Severity: 10
vulnerability
Explore
FreeBSD: VID-89C668D5-2F80-11F0-9632-641C67A117D8: www/varnish7 -- Request Smuggling Attack
Published: May 12, 2025 | Severity: 9
vulnerability
Explore
WordPress Plugin: relevanssi: CVE-2025-4396: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Published: May 12, 2025 | Severity: 8
vulnerability
Explore
WordPress Plugin: newsletters-lite: CVE-2025-3107: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Published: May 12, 2025 | Severity: 7
vulnerability
Explore
Debian: CVE-2025-24223: webkit2gtk, wpewebkit -- security update
Published: May 12, 2025 | Severity: 9
vulnerability
Explore