Cybersecurity

CVE Search

Vulnerability database and lookup

Search our database of 200K+ CVEs. Get detailed vulnerability information including CVSS scores, affected products, exploit availability, and remediation guidance.

Try It NowFree
Try:|

Get instant threat analysis with risk scores, threat categories, and detailed reports.

200K+
CVEs Indexed
Hourly
Updates
25+ Years
Historical Data
Real-time
Exploit Tracking

Key Features

Everything you need to protect your infrastructure and users

Full-Text Search

Search CVEs by ID, product, vendor, or description keywords.

CVSS Scores

View CVSS v2, v3, and v4 scores with detailed metrics.

Affected Products

See all products and versions affected by each CVE.

Exploit Tracking

Know if public exploits exist for vulnerabilities.

Trend Analysis

Track vulnerability trends and most active CVEs.

Alert Subscriptions

Get notified about new CVEs affecting your products.

Use Cases

How security teams use this tool

Vulnerability Management

Research CVEs affecting your infrastructure.

Patch Prioritization

Focus on CVEs with public exploits or high CVSS.

Security Research

Analyze vulnerability trends and patterns.

Compliance

Document vulnerability remediation for audits.

Comprehensive CVE Database for Security Research

Our CVE database contains over 200,000 vulnerabilities dating back to 1999, providing security teams with a comprehensive resource for vulnerability research. Each CVE entry includes: - Complete vulnerability descriptions and technical details - CVSS v2, v3, and v4 severity scores with vector strings - Affected products, versions, and CPE identifiers - Links to patches, advisories, and technical references - Publication and modification timestamps Whether you're researching a specific CVE or analyzing vulnerability trends, our search engine helps you find the information you need quickly.

Real-Time CVE Updates and Exploit Tracking

New vulnerabilities are disclosed daily, and some become actively exploited within hours. Our platform provides: - **Rapid Updates**: New CVEs added within hours of NVD publication - **Exploit Tracking**: Monitoring of ExploitDB, Metasploit, GitHub, and other sources - **CISA KEV Integration**: Highlighting known exploited vulnerabilities - **Trending CVEs**: Visibility into which vulnerabilities are getting attention Knowing whether a public exploit exists helps prioritize patching efforts - vulnerabilities with weaponized exploits should be addressed immediately.

Advanced CVE Search Capabilities

Our search engine goes beyond simple CVE ID lookups to enable sophisticated queries: - **Full-Text Search**: Find CVEs by description keywords, not just IDs - **Product Filtering**: Search by vendor, product name, or CPE identifier - **CVSS Filtering**: Find vulnerabilities by severity score or attack vector - **Date Ranges**: Search for CVEs published or modified within specific periods - **Exploit Status**: Filter for CVEs with known public exploits These capabilities help security teams quickly find relevant vulnerabilities for their specific technology stack or research needs.

Using CVE Intelligence for Patch Prioritization

Not all vulnerabilities are equal. Our CVE intelligence helps prioritize patching by highlighting: - **Exploitability**: CVEs with public exploits or proof-of-concept code - **Attack Surface**: Remotely exploitable vs. local privilege escalation - **Business Impact**: Potential for data theft, service disruption, or ransomware - **Active Exploitation**: CVEs currently being exploited in the wild (CISA KEV) By focusing on high-risk vulnerabilities first, security teams can reduce their attack surface more efficiently than patching by CVSS score alone.

Frequently Asked Questions

How many CVEs are in your database?
We index all CVEs from NVD, currently over 200,000 vulnerabilities dating back to 1999.
How quickly are new CVEs added?
New CVEs are added within hours of publication to NVD. Critical CVEs may be added even faster.
Do you track exploit availability?
Yes, we track public exploits from sources like ExploitDB, Metasploit, and GitHub.
Can I search by product or vendor?
Yes, you can search by CVE ID, product name, vendor, keyword, or CPE identifier.

Ready to Get Started?

Join thousands of security teams using isMalicious to protect their infrastructure.