SecurityVulnerability.io
Collect, Display, Alert.
The Cyber Security
Vulnerability Database
Trending
Vulnerabilities
If it's trending, then it's probably important.
Patch quicker!
Remote Code Execution Vulnerability in Windows Server Update Service by Microsoft
CVE-2025-59287
MicrosoftWindows Serv...π°πΎπ‘π£9.8CRITICAL
Remote Code Execution Vulnerability in Microsoft Graphics Component
CVE-2025-50165
MicrosoftWindows Serv...πΎ9.8CRITICAL
File Write Vulnerability in Claude Code by Anthropic
CVE-2025-64755
AnthropicsClaude-code8.7HIGH
Heap Buffer Overflow Vulnerability in LIBPNG Affects Multiple Versions
CVE-2025-65018
PnggroupLibpng7.1HIGH
Unauthenticated Access Vulnerability in Oracle E-Business Suite - BI Publisher Integration
CVE-2025-61882
OracleOracle Concu...π°πΎπ‘π£9.8CRITICAL
Directory Traversal Vulnerability in 7-Zip by 7-Zip Team
CVE-2025-11001
7-zip7-zipπ°πΎπ‘7HIGH
Unauthorized Access in Oracle Fusion Middleware's Identity Manager
CVE-2025-61757
OracleIdentity Man...πΎπ‘π£9.8CRITICAL
Elevation of Privilege Vulnerability in Azure Bastion by Microsoft
CVE-2025-49752
MicrosoftAzure Bastio...πΎ10CRITICAL
Command Injection Vulnerability in W3 Total Cache WordPress Plugin
CVE-2025-9501
WordPressW3 Total Cacheπ°πΎπ‘9CRITICAL
Latest Ransomware
Vulnerabilities
Remote Code Execution Vulnerability in TP-Link Archer Routers
CVE-2024-53375TP-Linkπ°πΎEPSS 21%π°Command Injection Vulnerability in W3 Total Cache WordPress Plugin
CVE-2025-9501WordPressW3 Total Cacheππ°πΎπ‘π°9CRITICALRay API Vulnerability Allows Remote Code Execution
CVE-2023-48022AnyscaleRayπ°πΎπ‘EPSS 91%π°9.8CRITICALDirectory Traversal Vulnerability in 7-Zip by 7-Zip Team
CVE-2025-110017-zip7-zipπ₯ππ°πΎπ‘π°7HIGHOS Command Injection Vulnerability in Fortinet FortiWeb
CVE-2025-58034FortinetFortiwebππ°πΎEPSS 48%π¦ π°6.7MEDIUM
26 November 2025
20 November 2025
19 November 2025
Exploit Intelligence by SecurityVulnerability.io
Understand what's being exploited!
Highlighting what's important

Emerging vulnerabilities & threats
Every hour we analyze over 50 data sources to identify the emerging threats that matter to you, and your business!

Trusted by
SecurityVulnerability.io was built to help colleagues in the industry.
- Active Users
- 30k+
- Data Sources
- 50+
- Vulnerabilies Tracked
- 200k+
- New Vulnerabilities Each Day
- 120+
5 out of 5 stars
βUnderstanding what's really important in a world with too much information allows Cytadel to always be at the cutting edge of protective activites.β

Manit Sahib
CEO of Cytadel
Boost your productivity.
Start using SecurityVulnerability.io
The database is open and free to use.
Advanced queries and alerting require a free account.
The Blog
Advice from the first line...
Frequently asked questions
- π What is SecurityVulnerability.io?
- SecurityVulnerability.io is a live platform that curates, summarizes, and explains critical Cyber Security vulnerabilities (CVEs) for security professionals, engineers, and IT teams. We make it easier to track threats across vendors like Microsoft, Cisco, Apple, and more β without the noise.
- π How does SecurityVulnerability.io work?
- We analyze thousands of sources, including CVE databases, vendor advisories, and security blogs, to provide you with the most relevant and actionable information. Our platform uses advanced algorithms to filter out noise and highlight the vulnerabilities that matter most.
- π How often is the site updated?
- We publish updates hourly. New CVEs, emerging exploits, high-severity alerts, and major vendor advisories are continuously monitored and posted.
- π How can I stay informed about new vulnerabilities?
- You can subscribe to our newsletter, follow us on social media, or set up alerts on our platform to receive notifications about new vulnerabilities and updates.
- π° Is SecurityVulnerability.io free?
- Yes! Our platform is completely free to use. We believe in providing valuable resources to the Cyber Security community without any cost.
- π οΈ Do you provide exploit details or PoCs?
- When available and publicly disclosed, we include links to proof-of-concept (PoC) exploits, or tag the vulnerability as actively exploited in the wild. However, we never host code ourselves.

