Vulnerability & Exploit Database

Try Surface Command Get a continuous 360° view of your attack surface

A curated repository of vetted computer software exploits and exploitable vulnerabilities.

Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review. The exploits are all included in the Metasploit framework. Our vulnerability and exploit database is updated frequently and contains the most recent security research.

Results 9,661 - 9,680 of 263,850 in total
Debian: CVE-2024-56171: libxml2 -- security update
Published: February 18, 2025 | Severity: 9
vulnerability
Explore
Huawei EulerOS: CVE-2025-27113: libxml2 security update
Published: February 18, 2025 | Severity: 8
vulnerability
Explore
Atlassian JIRA: CVE-2024-7254: DoS (Denial of Service) com.google.protobuf:protobuf-java Dependency in Jira Software Data Center and Server
Published: February 18, 2025 | Severity: 9
vulnerability
Explore
OpenSSH Vulnerability: CVE-2025-26465
Published: February 18, 2025 | Severity: 7
vulnerability
Explore
Amazon Linux 2023: CVE-2024-56171: Important priority package update for libxml2
Published: February 18, 2025 | Severity: 6
vulnerability
Explore
OS X update for libxml2 (CVE-2024-56171)
Published: February 18, 2025 | Severity: 6
vulnerability
Explore
OS X update for libxml2 (CVE-2025-27113)
Published: February 18, 2025 | Severity: 8
vulnerability
Explore
WordPress Plugin: yayforms: CVE-2024-12522: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Published: February 18, 2025 | Severity: 5
vulnerability
Explore
Debian: CVE-2024-57258: u-boot -- security update
Published: February 18, 2025 | Severity: 10
vulnerability
Explore
Debian: CVE-2024-57257: u-boot -- security update
Published: February 18, 2025 | Severity: 7
vulnerability
Explore
Ubuntu: USN-7302-1 (CVE-2025-24928): libxml2 vulnerabilities
Published: February 18, 2025 | Severity: 10
vulnerability
Explore
WordPress Plugin: subscribe2: CVE-2024-11582: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Published: February 18, 2025 | Severity: 6
vulnerability
Explore
WordPress Plugin: store-locator-widget: CVE-2024-13657: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Published: February 18, 2025 | Severity: 5
vulnerability
Explore
Debian: CVE-2024-57259: u-boot -- security update
Published: February 18, 2025 | Severity: 10
vulnerability
Explore
Debian: CVE-2024-57254: u-boot -- security update
Published: February 18, 2025 | Severity: 7
vulnerability
Explore
Debian: CVE-2024-57255: u-boot -- security update
Published: February 18, 2025 | Severity: 6
vulnerability
Explore
Debian: CVE-2025-1390: libcap2 -- security update
Published: February 18, 2025 | Severity: 5
vulnerability
Explore
SUSE: CVE-2025-21703: SUSE Linux Security Advisory
Published: February 18, 2025 | Severity: 7
vulnerability
Explore
Huawei EulerOS: CVE-2025-24928: libxml2 security update
Published: February 18, 2025 | Severity: 6
vulnerability
Explore
WordPress Plugin: ltl-freight-quotes-abf-freight-edition: CVE-2024-13485: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Published: February 18, 2025 | Severity: 8
vulnerability
Explore