Security Vulnerability Logo
Vulnerabilities
πŸ”” Alerts
VendorsExploitsStatsBlogNewsroom

Trending
Vulnerabilities

The vulnerabilities people are talking about...

If it's trending, then it's probably important.
Patch quicker!

Server-Side Request Forgery Vulnerability in Next.js Framework by Vercel

CVE-2026-44578
VercelNext.jsπŸ‘ΎπŸŸ‘8.6HIGH

Heap Buffer Overflow in NGINX Plus and NGINX Open Source Affecting ngx_http_rewrite_module

CVE-2026-42945
F5Nginx PlusπŸ‘ΎπŸŸ‘9.2CRITICAL

Legacy API Interface Vulnerability in EZVIZ Products

CVE-2026-32683
EzvizEzviz App5.3MEDIUM

Cross-Site Scripting Vulnerability in Microsoft Exchange Server

CVE-2026-42897
MicrosoftMicrosoft Ex...πŸ’°πŸ‘Ύ8.1HIGH

Heap-Based Buffer Overflow in Microsoft Windows DNS Impacting Network Security

CVE-2026-41096
MicrosoftWindows 11 V...9.8CRITICAL

Privilege Escalation Vulnerability in Linux Kernel by The Linux Foundation

CVE-2016-5195
CanonicalUbuntu LinuxπŸ‘ΎπŸŸ‘πŸŸ£7HIGH

Out-of-Bounds Write Vulnerability in Dolby UDC Software

CVE-2025-54957
DolbyUDC SoftwareπŸ‘ΎπŸŸ‘9.8CRITICAL

Authentication Bypass Vulnerability in Palo Alto Networks PAN-OS Software

CVE-2026-0265
Palo Alto...Cloud NgfwπŸ‘Ύ2.7LOW

Remote Code Execution Vulnerability in GitHub Enterprise Server

CVE-2026-3854
GithubEnterprise S...πŸ’°πŸ‘ΎπŸŸ‘8.7HIGH

Trending Vulnerabilities Feeds

JSONRSSCSV
Security Vulnerability Logo

By

Dave

Don't Click Me ❀️


SecurityVulnerability.io is not affiliated with anyone, no vendors, no companies, no logos, the National Vulnerability Database (NVD), The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation. All rights reserved SecurityVulnerability.io