2025
Vulnerability Stats
It's January 12 and 1,400 vulnerabilities have been published in 2025.
This marks an increase of 32% compared to this time last year.
The vulnerability statistics page is updated daily and is designed to be easily screenshotable and shareable.
2025
Vulnerability Breakdown
- CRITICAL
- 44
- HIGH
- 191
- MEDIUM
- 646
- LOW
- 11
Plus 508 vulnerabilities yet to be given a severity rating.
2025 Vulnerability Severity By Month
117
New vulnerabilities every day in 2025
Each day your organisation needs to check and patch 117 vulnerability.
Across 1000's of devices!
Vulnerabilities Trending in 2025
Top 10 Trending Vulnerabilities for 2025
Pareto Principle
The 80/20 Rule
The Pareto principle states that for many outcomes, roughly 80% of consequences come from 20% of causes.
In the world of Vulnerability Management, only a small amount of CVEs introduce the majority of risk.
Tracking CVEs that generate vibrant conversation gives us a tool to reliability identify the most important vulnerabilities.
2016 - 2025 Vulnerability Severity By Year
More Vulnerabilities
Means more Exploits
Which means more Ransomware
Exploits are HOT π₯
So far 2025 has given us allot to think about.
0 Days
Average exploit development time in 2025
The time taken for a vulnerability being published to it being exploited.
133 Exploited
Vulnerabilities Exploited
133 of the 1,400 vulnerabilities published in 2025 have been exploited.
123 Zerodays
Zeroday
A vulnerability which is exploited before Mitre or NVD published its existance.
Only a Small Number of Vulnerabilities are Exploited
Vulnerability Arrivals π
Vulnerabilities are not published in a predictable way. Every day is a vulnerable day π€¨
Vulnerability Published Matrix for 2025
Vulnerability Published Matrix for 2024
Vendor Breakdown
Wonder if your vendors are doing a good job? π€
Vulnerability Weighted Impact by Vendors
Impact is the sum of the CVSSv3 base score for all vulnerabilities by vendor.
Huawei
28 Vulnerabilities
Linux
23 Vulnerabilities
IBM
23 Vulnerabilities
Qualcomm
19 Vulnerabilities
WordPress
16 Vulnerabilities
17 Exploited πΎ
mediatek
13 Vulnerabilities
D-Link
7 Vulnerabilities
7 Exploited πΎ
Mozilla
7 Vulnerabilities
Palo Alto Networks
5 Vulnerabilities
5 Exploited πΎ
Red Hat
4 Vulnerabilities