2025
Vulnerability Stats
It's May 8 and 17,214 vulnerabilities have been published in 2025.
This marks an increase of 24% compared to this time last year.
The vulnerability statistics page is updated daily and is designed to be easily screenshotable and shareable.
2025
Vulnerability Breakdown
- CRITICAL
- 1,334
- HIGH
- 5,271
- MEDIUM
- 8,157
- LOW
- 491
Plus 1,956 vulnerabilities yet to be given a severity rating.
2025 Vulnerability Severity By Month

134
New vulnerabilities every day in 2025
Each day your organisation needs to check and patch 134 vulnerability.
Across 1000's of devices!
Vulnerabilities Trending in 2025
Top 10 Trending Vulnerabilities for 2025
Authorization Bypass in Next.js Framework by Ve...
Stack-Based Buffer Overflow in Ivanti Connect S...
Unauthorized Metadata Upload Vulnerability in S...
Undocumented Hidden Commands in Espressif ESP32...
Remote Attackers Can Gain Super-Admin Privilege...
Authorization Issue in iPadOS and iOS by Apple
Authentication Bypass in Palo Alto Networks PAN...
Sandbox Escape Vulnerability in Mojo of Google ...
SSRF Vulnerability in Axios HTTP Client for Bro...
Windows OLE Remote Code Execution Vulnerability...
Pareto Principle
The 80/20 Rule
The Pareto principle states that for many outcomes, roughly 80% of consequences come from 20% of causes.
In the world of Vulnerability Management, only a small amount of CVEs introduce the majority of risk.
Tracking CVEs that generate vibrant conversation gives us a tool to reliability identify the most important vulnerabilities.
2016 - 2025 Vulnerability Severity By Year

More Vulnerabilities
Means more Exploits
Which means more Ransomware
Vulnerability Arrivals ๐
Vulnerabilities are not published in a predictable way. Every day is a vulnerable day ๐คจ
Vulnerability Published Matrix for 2025
Vulnerability Published Matrix for 2024
Vendor Breakdown
Wonder if your vendors are doing a good job? ๐ค
Vulnerability Weighted Impact by Vendors
Impact is the sum of the CVSSv3 base score for all vulnerabilities by vendor.
WordPress
3669 Vulnerabilities
286 Exploited ๐พ
Linux
884 Vulnerabilities
1 Exploited ๐พ
Microsoft
432 Vulnerabilities
28 Exploited ๐พ
IBM
288 Vulnerabilities
4 Exploited ๐พ
Apple
267 Vulnerabilities
12 Exploited ๐พ
PHPGurukul
217 Vulnerabilities
171 Exploited ๐พ
Adobe
160 Vulnerabilities
Oracle
158 Vulnerabilities
1 Exploited ๐พ
Google
140 Vulnerabilities
3 Exploited ๐พ
Qualcomm
139 Vulnerabilities
2 Exploited ๐พ