2025
Vulnerability Stats
It's January 20 and 2,697 vulnerabilities have been published in 2025.
This marks an increase of 48% compared to this time last year.
The vulnerability statistics page is updated daily and is designed to be easily screenshotable and shareable.
2025
Vulnerability Breakdown
- CRITICAL
- 154
- HIGH
- 609
- MEDIUM
- 1,046
- LOW
- 28
Plus 860 vulnerabilities yet to be given a severity rating.
2025 Vulnerability Severity By Month
135
New vulnerabilities every day in 2025
Each day your organisation needs to check and patch 135 vulnerability.
Across 1000's of devices!
Vulnerabilities Trending in 2025
Top 10 Trending Vulnerabilities for 2025
Stack-Based Buffer Overflow in Ivanti Connect S...
Remote Attackers Can Gain Super-Admin Privilege...
Windows Kernel Memory Information Disclosure Vu...
Reloader Vulnerability: Execution of Unsigned S...
Heap-based Buffer Overflow Vulnerability in Rsy...
Elevated Privilege Exposure in Windows Hyper-V ...
Profile Configuration Exposure in OpenVPN Connect
Remote Code Execution Vulnerability in Aviatrix...
Authentication Bypass Vulnerability in NETGEAR ...
Pareto Principle
The 80/20 Rule
The Pareto principle states that for many outcomes, roughly 80% of consequences come from 20% of causes.
In the world of Vulnerability Management, only a small amount of CVEs introduce the majority of risk.
Tracking CVEs that generate vibrant conversation gives us a tool to reliability identify the most important vulnerabilities.
2016 - 2025 Vulnerability Severity By Year
More Vulnerabilities
Means more Exploits
Which means more Ransomware
Vulnerability Arrivals π
Vulnerabilities are not published in a predictable way. Every day is a vulnerable day π€¨
Vulnerability Published Matrix for 2025
Vulnerability Published Matrix for 2024
Vendor Breakdown
Wonder if your vendors are doing a good job? π€
Vulnerability Weighted Impact by Vendors
Impact is the sum of the CVSSv3 base score for all vulnerabilities by vendor.
Microsoft
162 Vulnerabilities
6 Exploited πΎ
IBM
47 Vulnerabilities
1 Exploited πΎ
Linux
36 Vulnerabilities
Huawei
28 Vulnerabilities
WordPress
22 Vulnerabilities
24 Exploited πΎ
ivanti
19 Vulnerabilities
1 Exploited πΎ
Qualcomm
19 Vulnerabilities
Fortinet
16 Vulnerabilities
1 Exploited πΎ
Google
16 Vulnerabilities
Adobe
14 Vulnerabilities