SecurityVulnerability.io
Collect, Display, Alert.
The Cyber Security
Vulnerability Database
Trending
Vulnerabilities
If it's trending, then it's probably important.
Patch quicker!
Security Feature Bypass in ASP.NET Core by Microsoft
CVE-2025-55315
MicrosoftAsp.net Core...πΎπ‘9.9CRITICAL
Elevation of Privilege Vulnerability in Windows Remote Access Connection Manager by Microsoft
CVE-2025-59230
MicrosoftWindows 10 V...πΎ7.8HIGH
SQL Injection Vulnerability in Fortinet FortiWeb Product
CVE-2025-25257
FortinetFortiwebπ°πΎπ‘π£9.6CRITICAL
Stack-Based Buffer Overflow in Linksys Wireless Extenders
CVE-2025-9252
LinksysRe6250πΎπ‘8.7HIGH
Privilege Escalation in Notepad++ Installer Affects Multiple Users
CVE-2025-49144
Notepad-p...Notepad-plus...πΎπ‘7.3HIGH
Use-After-Free Vulnerability in Redis Open Source Database
CVE-2025-49844
RedisRedisπ°πΎπ‘10CRITICAL
Improper Access Control in Windows SMB Affects Microsoft Products
CVE-2025-33073
MicrosoftWindows 10 V...π°πΎπ‘8.8HIGH
Remote Code Execution Vulnerability in Windows Server Update Service by Microsoft
CVE-2025-59287
MicrosoftWindows Serv...π°πΎπ‘9.8CRITICAL
Race Condition Vulnerability in Windows Cloud Files by Microsoft
CVE-2025-55680
MicrosoftWindows 11 V...πΎ7.8HIGH
Latest Ransomware
Vulnerabilities
Improper Access Control in Windows SMB Affects Microsoft Products
CVE-2025-33073MicrosoftWindows 10 Version 1809π₯ππ°πΎπ‘EPSS 38%π¦ π°8.8HIGHSecurity Flaw in Oracle E-Business Suite Components
CVE-2025-61884OracleOracle Configuratorπ₯ππ°πΎπ‘π¦ π°7.5HIGHBypass Restrictions in Appliance Mode for F5 Networks Software
CVE-2025-53868F5Big-ipπ°πΎπ°8.5HIGHDenial of Service and Code Execution Vulnerability in Cisco IOS Software and Cisco IOS XE Software
CVE-2025-20352CiscoiOSππ°πΎπ¦ π°7.7HIGHRemote Code Execution Vulnerability in Windows Server Update Service by Microsoft
CVE-2025-59287MicrosoftWindows Server 2019ππ°πΎπ‘π°9.8CRITICAL
21 October 2025
20 October 2025
16 October 2025
14 October 2025
Exploit Intelligence by SecurityVulnerability.io
Understand what's being exploited!
Highlighting what's important

Emerging vulnerabilities & threats
Every hour we analyze over 50 data sources to identify the emerging threats that matter to you, and your business!

Trusted by
SecurityVulnerability.io was built to help colleagues in the industry.
- Active Users
- 30k+
- Data Sources
- 50+
- Vulnerabilies Tracked
- 200k+
- New Vulnerabilities Each Day
- 120+
5 out of 5 stars
βUnderstanding what's really important in a world with too much information allows Cytadel to always be at the cutting edge of protective activites.β

Manit Sahib
CEO of Cytadel
Boost your productivity.
Start using SecurityVulnerability.io
The database is open and free to use.
Advanced queries and alerting require a free account.
The Blog
Advice from the first line...
Frequently asked questions
- π What is SecurityVulnerability.io?
- SecurityVulnerability.io is a live platform that curates, summarizes, and explains critical Cyber Security vulnerabilities (CVEs) for security professionals, engineers, and IT teams. We make it easier to track threats across vendors like Microsoft, Cisco, Apple, and more β without the noise.
- π How does SecurityVulnerability.io work?
- We analyze thousands of sources, including CVE databases, vendor advisories, and security blogs, to provide you with the most relevant and actionable information. Our platform uses advanced algorithms to filter out noise and highlight the vulnerabilities that matter most.
- π How often is the site updated?
- We publish updates hourly. New CVEs, emerging exploits, high-severity alerts, and major vendor advisories are continuously monitored and posted.
- π How can I stay informed about new vulnerabilities?
- You can subscribe to our newsletter, follow us on social media, or set up alerts on our platform to receive notifications about new vulnerabilities and updates.
- π° Is SecurityVulnerability.io free?
- Yes! Our platform is completely free to use. We believe in providing valuable resources to the Cyber Security community without any cost.
- π οΈ Do you provide exploit details or PoCs?
- When available and publicly disclosed, we include links to proof-of-concept (PoC) exploits, or tag the vulnerability as actively exploited in the wild. However, we never host code ourselves.