Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 01 - 20 of 229,525 in total
Microsoft Edge Chromium: CVE-2025-29815
Published: April 04, 2025 | Severity: 6
vulnerability
Explore
Microsoft Edge Chromium: CVE-2025-25000
Published: April 04, 2025 | Severity: 6
vulnerability
Explore
Ivanti Pulse Connect Secure: April Security Advisory Ivanti Connect Secure, Policy Secure and ZTA Gateways (CVE-2025-22457)
Published: April 03, 2025 | Severity: 9
vulnerability
Explore
Jenkins Advisory 2025-04-02: CVE-2025-31721: Missing permission check allows retrieving secrets from agent configurations
Published: April 03, 2025 | Severity: 8
vulnerability
Explore
Jenkins Advisory 2025-04-02: CVE-2025-31725: Passwords stored in plain text by monitor-remote-job Plugin
Published: April 03, 2025 | Severity: 10
vulnerability
Explore
Jenkins Advisory 2025-04-02: CVE-2025-31720: Missing permission check allows retrieving agent configurations
Published: April 03, 2025 | Severity: 9
vulnerability
Explore
Jenkins Advisory 2025-04-02: CVE-2025-31723: CSRF vulnerability in Simple Queue Plugin
Published: April 03, 2025 | Severity: 9
vulnerability
Explore
Jenkins Advisory 2025-04-02: CVE-2025-31724: API keys stored in plain text by Cadence vManager Plugin
Published: April 03, 2025 | Severity: 9
vulnerability
Explore
Jenkins Advisory 2025-04-02: CVE-2025-31722: Script Security sandbox bypass vulnerability through folder-scoped libraries in Templating Engine Plugin
Published: April 03, 2025 | Severity: 10
vulnerability
Explore
Jenkins Advisory 2025-04-02: CVE-2025-31727: CVE-2025-31728: API keys stored and displayed in plain text by AsakusaSatellite Plugin
Published: April 03, 2025 | Severity: 8
vulnerability
Explore
Jenkins Advisory 2025-04-02: CVE-2025-31726: API keys stored in plain text by Stack Hammer Plugin
Published: April 03, 2025 | Severity: 8
vulnerability
Explore
Ubuntu: (CVE-2025-31115): xz-utils vulnerability
Published: April 03, 2025 | Severity: 5
vulnerability
Explore
Debian: CVE-2025-3071: chromium -- security update
Published: April 02, 2025 | Severity: 8
vulnerability
Explore
Debian: CVE-2025-3067: chromium -- security update
Published: April 02, 2025 | Severity: 10
vulnerability
Explore
Debian: CVE-2025-3072: chromium -- security update
Published: April 02, 2025 | Severity: 4
vulnerability
Explore
Google Chrome Vulnerability: CVE-2025-3074 Inappropriate implementation in Downloads
Published: April 02, 2025 | Severity: 9
vulnerability
Explore
Microsoft Edge Chromium: CVE-2025-3071 Inappropriate implementation in Navigations
Published: April 02, 2025 | Severity: 8
vulnerability
Explore
Microsoft Edge Chromium: CVE-2025-3069 Inappropriate implementation in Extensions
Published: April 02, 2025 | Severity: 9
vulnerability
Explore
Debian: CVE-2025-3069: chromium -- security update
Published: April 02, 2025 | Severity: 9
vulnerability
Explore
Debian: CVE-2025-3070: chromium -- security update
Published: April 02, 2025 | Severity: 9
vulnerability
Explore