Vulnerability database and lookup
Search our database of 200K+ CVEs. Get detailed vulnerability information including CVSS scores, affected products, exploit availability, and remediation guidance.
Get instant threat analysis with risk scores, threat categories, and detailed reports.
Everything you need to protect your infrastructure and users
Search CVEs by ID, product, vendor, or description keywords.
View CVSS v2, v3, and v4 scores with detailed metrics.
See all products and versions affected by each CVE.
Know if public exploits exist for vulnerabilities.
Track vulnerability trends and most active CVEs.
Get notified about new CVEs affecting your products.
How security teams use this tool
Research CVEs affecting your infrastructure.
Focus on CVEs with public exploits or high CVSS.
Analyze vulnerability trends and patterns.
Document vulnerability remediation for audits.
Our CVE database contains over 200,000 vulnerabilities dating back to 1999, providing security teams with a comprehensive resource for vulnerability research. Each CVE entry includes: - Complete vulnerability descriptions and technical details - CVSS v2, v3, and v4 severity scores with vector strings - Affected products, versions, and CPE identifiers - Links to patches, advisories, and technical references - Publication and modification timestamps Whether you're researching a specific CVE or analyzing vulnerability trends, our search engine helps you find the information you need quickly.
New vulnerabilities are disclosed daily, and some become actively exploited within hours. Our platform provides: - **Rapid Updates**: New CVEs added within hours of NVD publication - **Exploit Tracking**: Monitoring of ExploitDB, Metasploit, GitHub, and other sources - **CISA KEV Integration**: Highlighting known exploited vulnerabilities - **Trending CVEs**: Visibility into which vulnerabilities are getting attention Knowing whether a public exploit exists helps prioritize patching efforts - vulnerabilities with weaponized exploits should be addressed immediately.
Our search engine goes beyond simple CVE ID lookups to enable sophisticated queries: - **Full-Text Search**: Find CVEs by description keywords, not just IDs - **Product Filtering**: Search by vendor, product name, or CPE identifier - **CVSS Filtering**: Find vulnerabilities by severity score or attack vector - **Date Ranges**: Search for CVEs published or modified within specific periods - **Exploit Status**: Filter for CVEs with known public exploits These capabilities help security teams quickly find relevant vulnerabilities for their specific technology stack or research needs.
Not all vulnerabilities are equal. Our CVE intelligence helps prioritize patching by highlighting: - **Exploitability**: CVEs with public exploits or proof-of-concept code - **Attack Surface**: Remotely exploitable vs. local privilege escalation - **Business Impact**: Potential for data theft, service disruption, or ransomware - **Active Exploitation**: CVEs currently being exploited in the wild (CISA KEV) By focusing on high-risk vulnerabilities first, security teams can reduce their attack surface more efficiently than patching by CVSS score alone.
Learn more from our security research blog
Join thousands of security teams using isMalicious to protect their infrastructure.