SecurityVulnerability.io
Collect, Display, Alert.
The Cyber Security
Vulnerability Database
Trending
Vulnerabilities
If it's trending, then it's probably important.
Patch quicker!
Heap Buffer Overflow in NGINX Plus and NGINX Open Source Affecting ngx_http_rewrite_module
CVE-2026-42945
F5Nginx PlusπΎπ‘9.2CRITICAL
Response Authenticator Oversize Check in Linux Kernel
CVE-2026-31635
LinuxLinuxπΎ7.5HIGH
Ptrace Vulnerability in Linux Kernel Affecting Memory Management
CVE-2026-46333
LinuxLinuxπΎπ‘7.1HIGH
Authentication Bypass Vulnerability in Palo Alto Networks PAN-OS Software
CVE-2026-0265
Palo Alto...Cloud NgfwπΎ2.7LOW
Windows Kernel Elevation of Privilege Vulnerability in Microsoft Products
CVE-2026-40369
MicrosoftWindows 11 V...πΎπ‘7.8HIGH
Cross-Site Scripting Vulnerability in Microsoft Exchange Server
CVE-2026-42897
MicrosoftMicrosoft Ex...π°πΎ8.1HIGH
Security Feature Bypass in Windows by Microsoft
CVE-2026-45585
MicrosoftWindows 11 V...πΎπ‘6.8MEDIUM
Remote Code Execution Vulnerability in GitHub Enterprise Server
CVE-2026-3854
GithubEnterprise S...π°πΎπ‘8.7HIGH
SQL Injection Vulnerability in Drupal Core by Drupal
CVE-2026-9082
DrupalDrupal CoreπΎπ‘9.1CRITICAL
The Blog
Advice from the first line...
Latest Ransomware
Vulnerabilities
Elevation of Privilege Vulnerability in Microsoft Defender
CVE-2026-41091MicrosoftMicrosoft Malware Prot...ππ°πΎEPSS 12%π¦ π°7.8HIGHMFA Bypass Vulnerability in SonicWALL SSL-VPN Affecting Microsoft Active Directory Integration
CVE-2024-12802SonicwallSonicosπ°πΎπ°9.1CRITICALUse-After-Free Vulnerability in Exim Due to GnuTLS Configuration
CVE-2026-45185EximEximππ°πΎπ‘π°9.8CRITICALCross-Site Scripting Vulnerability in Microsoft Exchange Server
CVE-2026-42897MicrosoftMicrosoft Exchange Ser...ππ°πΎEPSS 10%π¦ π°8.1HIGHAuthentication Bypass in Cisco Catalyst SD-WAN Controller and Manager
CVE-2026-20182CiscoCisco Catalyst Sd-wan ...ππ°πΎEPSS 69%π¦ π°10CRITICAL
21 May 2026
20 May 2026
18 May 2026
17 May 2026
14 May 2026
Exploit Intelligence by SecurityVulnerability.io
Understand what's being exploited!
Highlighting what's important

Emerging vulnerabilities & threats
Every hour we analyze over 50 data sources to identify the emerging threats that matter to you, and your business!

Trusted by
SecurityVulnerability.io was built to help colleagues in the industry.
- Active Users
- 30k+
- Data Sources
- 50+
- Vulnerabilies Tracked
- 200k+
- New Vulnerabilities Each Day
- 120+
5 out of 5 stars
βUnderstanding what's really important in a world with too much information allows Cytadel to always be at the cutting edge of protective activites.β

Manit Sahib
CEO of Cytadel
Boost your productivity.
Start using SecurityVulnerability.io
The database is open and free to use.
Advanced queries and alerting require a free account.
Frequently asked questions
- π What is SecurityVulnerability.io?
- SecurityVulnerability.io is a live platform that curates, summarizes, and explains critical Cyber Security vulnerabilities (CVEs) for security professionals, engineers, and IT teams. We make it easier to track threats across vendors like Microsoft, Cisco, Apple, and more β without the noise.
- π How does SecurityVulnerability.io work?
- We analyze thousands of sources, including CVE databases, vendor advisories, and security blogs, to provide you with the most relevant and actionable information. Our platform uses advanced algorithms to filter out noise and highlight the vulnerabilities that matter most.
- π How often is the site updated?
- We publish updates hourly. New CVEs, emerging exploits, high-severity alerts, and major vendor advisories are continuously monitored and posted.
- π How can I stay informed about new vulnerabilities?
- You can subscribe to our newsletter, follow us on social media, or set up alerts on our platform to receive notifications about new vulnerabilities and updates.
- π° Is SecurityVulnerability.io free?
- Yes! Our platform is completely free to use. We believe in providing valuable resources to the Cyber Security community without any cost.
- π οΈ Do you provide exploit details or PoCs?
- When available and publicly disclosed, we include links to proof-of-concept (PoC) exploits, or tag the vulnerability as actively exploited in the wild. However, we never host code ourselves.

