CVE Search

Search the world's CVEslive from our database

23.2K+ CVEs enriched with EPSS, CISA KEV, CERT-FR, MSRC, GHSA, Exploit-DB, and Nuclei. Public REST API, free tier available.

23.2K+
CVEs in catalog

NVD-backed, continuously synced

33
Currently exploited

CISA KEV catalog ∪ SSVC=active

0
Critical (last 7d)

Severity = CRITICAL, published in window

120
High EPSS (>50%)

FIRST exploit-prediction probability

Refreshed every 30 minutes from production database

Hot CVEs right now

Recent high-severity CVEs straight from our PostgreSQL catalog — with KEV, EPSS, and exploitation flags inline.

Open in dashboard
HIGHEPSS 0.0%

CVE-2026-21637

A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handl…

Published May 7, 2026View details
CRITICALEPSS 0.0%

CVE-2025-11158

Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.6, including 9.3.x and 8.3.x, do not restrict Groovy scripts in new PRPT reports published by users, allowing insertion of arbitrary scripts and leading to a RCE.

Published Mar 10, 2026View details
HIGHEPSS 0.0%

CVE-2026-30929

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow thi…

Published Mar 10, 2026View details
HIGHEPSS 0.0%

CVE-2026-30926

SiYuan is a personal knowledge management system. Prior to 3.5.10, a privilege escalation vulnerability exists in the publish service of SiYuan Note that allows low-privilege publish accounts (RoleReader) to modify notebook content via the…

Published Mar 10, 2026View details
HIGHEPSS 0.1%

CVE-2026-28693

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an integer overflow in DIB coder can result in out of bounds read or write. This vulnerability is fixed…

Published Mar 10, 2026View details
HIGHEPSS 0.1%

CVE-2026-28691

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. T…

Published Mar 10, 2026View details
HIGHEPSS 0.0%

CVE-2026-28494

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow exists in ImageMagick's morphology kernel parsing functions. User-controlled ke…

Published Mar 10, 2026View details
HIGHEPSS 0.0%

CVE-2026-28432

Misskey is an open source, federated social media platform. All Misskey servers prior to 2026.3.1 contain a vulnerability that allows bypassing HTTP signature verification. Although this is a vulnerability related to federation, it affects…

Published Mar 10, 2026View details
HIGHEPSS 0.0%

CVE-2026-28431

Misskey is an open source, federated social media platform. All Misskey servers running versions 8.45.0 and later, but prior to 2026.3.1, contain a vulnerability that allows bad actors access to data that they ordinarily wouldn't be able to…

Published Mar 10, 2026View details

Three lenses on the catalog

Same database, different cuts. Each list is a real query against cveCatalog at request time.

Top KEV — last 30 days

No new KEV adds in the last 30 days.

Highest EPSS
RCE without auth

No unauthenticated RCEs flagged yet.

What we enrich every CVE with

Nine upstream sources, one normalized record per CVE.

NVD

Base CVE record + CVSS v3 scores and vectors

CISA KEV

Known Exploited Vulnerabilities catalog with due dates

EPSS

FIRST exploit-prediction score and percentile

CERT-FR

French national CSIRT advisories with severity

MSRC

Microsoft Security Response Center title + KB articles

GHSA

GitHub Security Advisories cross-references

Exploit-DB

Public proof-of-concept and exploit identifiers

Nuclei

Detection-template availability flag

OpenCVE

Change-log titles and history counts

What teams use it for

Vulnerability management

Continuous CPE-based monitoring with KEV / EPSS prioritization for the products you actually run.

Patch prioritization

Combine CVSS, EPSS, and KEV signals to rank which CVEs deserve emergency change windows.

CI/CD gating

Block pull requests when a dependency surfaces a high-EPSS or KEV-flagged CVE in the bulk API.

Compliance reporting

Export filtered CVE lists with CERT-FR / KEV / GHSA links for audit packets.

High-priority CVE advisory index

Stable public pages for CVEs with exploitation, KEV, EPSS, or severity signals useful during vendor and patch-risk research.

CVE-2024-29895CVE-2025-47812CVE-2024-34351CVE-2026-24061CVE-2024-46506CVE-2025-47916CVE-2025-49113CVE-2024-34257CVE-2020-36847CVE-2025-53770CVE-2024-25641CVE-2025-34510CVE-2025-40551CVE-2025-34511CVE-2025-71243CVE-2026-27174CVE-2020-36849CVE-2016-15043CVE-2026-1281CVE-2026-24423CVE-2026-1731CVE-2019-25224CVE-2022-25369CVE-2026-23760CVE-2024-32002CVE-2025-54309CVE-2024-48766CVE-2024-4434CVE-2025-49533CVE-2026-22200CVE-2024-32964CVE-2025-34111CVE-2025-48828CVE-2024-28075CVE-2025-49619CVE-2025-34079CVE-2024-32735CVE-2025-34088CVE-2025-5306CVE-2025-34026CVE-2025-34087CVE-2025-48827CVE-2024-32736CVE-2025-40536CVE-2020-36848CVE-2012-10020CVE-2012-10019CVE-2015-10138CVE-2015-10137CVE-2015-10143CVE-2026-1340CVE-2025-5777CVE-2015-10135CVE-2025-34086CVE-2026-21643CVE-2025-49136CVE-2024-32700CVE-2025-14558CVE-2013-10032CVE-2025-49704CVE-2024-3806CVE-2024-32739CVE-2025-54068CVE-2025-47608CVE-2015-10140CVE-2015-10134CVE-2026-1603CVE-2026-20127CVE-2015-10136CVE-2025-52046CVE-2026-26980CVE-2024-51978CVE-2025-6216CVE-2025-69516CVE-2024-32737CVE-2024-32738CVE-2026-29058CVE-2025-33053CVE-2025-36846CVE-2025-33073CVE-2025-4632CVE-2026-27180CVE-2025-6095CVE-2015-10139CVE-2014-125117CVE-2025-42999CVE-2025-32463CVE-2025-32975CVE-2025-34076CVE-2026-28515CVE-2025-32724CVE-2025-4008CVE-2025-4322CVE-2025-12548CVE-2025-33068CVE-2025-5086CVE-2025-32756CVE-2025-49716CVE-2024-31445CVE-2024-34359CVE-2025-6970CVE-2024-34716CVE-2026-27966CVE-2015-10133CVE-2025-20281CVE-2025-26677CVE-2025-45985CVE-2025-50201CVE-2024-4367CVE-2025-4334CVE-2025-41646CVE-2026-1368CVE-2026-2329CVE-2026-28517CVE-2024-29212CVE-2026-23744CVE-2025-25038CVE-2016-15057CVE-2026-1557CVE-2025-32429CVE-2026-21513CVE-2025-6934CVE-2026-2025CVE-2025-47539CVE-2026-1306CVE-2025-6793CVE-2025-34045CVE-2025-6058CVE-2025-4428CVE-2026-27175CVE-2026-28501CVE-2023-7337CVE-2025-27817CVE-2026-27971CVE-2025-52488CVE-2025-6771CVE-2026-28516CVE-2026-25512CVE-2025-49718CVE-2025-27203CVE-2026-1492CVE-2025-47163CVE-2026-27636CVE-2026-1357CVE-2026-28289CVE-2025-49002CVE-2025-25257CVE-2026-22769CVE-2025-4396CVE-2025-6794CVE-2025-30397CVE-2025-6805CVE-2025-6798CVE-2026-0926CVE-2025-6800CVE-2025-6796CVE-2025-6804CVE-2025-6803CVE-2025-6799CVE-2025-6797CVE-2026-21533CVE-2024-4605CVE-2025-1562CVE-2025-34036CVE-2026-27483CVE-2026-1405CVE-2025-32023CVE-2025-34031CVE-2025-34509CVE-2025-49825CVE-2024-4701CVE-2025-5394CVE-2025-45858CVE-2025-53833CVE-2020-37123CVE-2025-4380CVE-2025-4524CVE-2026-2416CVE-2026-31816CVE-2025-49132CVE-2024-4044CVE-2025-6770CVE-2025-40553CVE-2026-2033CVE-2025-52694CVE-2025-44148CVE-2024-34950CVE-2025-44881CVE-2025-44880CVE-2025-44882CVE-2025-53624CVE-2025-47166CVE-2025-30220CVE-2025-5701CVE-2024-4560CVE-2026-21509CVE-2025-7795CVE-2025-43559CVE-2024-34921CVE-2025-45986CVE-2025-45984CVE-2025-45987CVE-2025-45988CVE-2026-0770CVE-2026-20079CVE-2025-54313CVE-2026-24477CVE-2025-32813CVE-2025-43560CVE-2025-5126CVE-2025-32711CVE-2025-34035CVE-2024-29198CVE-2025-48954CVE-2025-5287

Frequently asked questions

How many CVEs are in the catalog?

The full NVD CVE catalog from 1999 to present is ingested with continuous backfill, and the count above reflects the live row count in our PostgreSQL store. We enrich each record with CISA KEV, EPSS, CERT-FR, MSRC, GHSA, Exploit-DB, Nuclei template availability, and OpenCVE change history when available.

How fresh is the data?

Daily NVD sync plus EPSS daily snapshots, CISA KEV refresh, and external enrichment cron jobs. The most recent CVEs typically land within a few hours of NVD publication.

What does "actively exploited" mean?

A CVE is shown as actively exploited when at least one of these is true: it appears in the CISA KEV catalog, FIRST has classified its SSVC exploitation level as "active", or our GCVE (Google CVE) enrichment has confirmed in-the-wild exploitation evidence.

How does EPSS differ from CVSS?

CVSS measures intrinsic severity (impact × exploitability). EPSS measures the empirical probability that a CVE will be exploited in the wild within the next 30 days, based on global telemetry. We surface both — most teams prioritize on EPSS × KEV first, then CVSS for ties.

Is CVE search included on the free tier?

Yes. The Free plan ($0, no credit card) includes 30 reputation/CVE checks per month with rate-limited API access. Basic ($49/mo) raises that to 2,000 and unlocks bulk, downloadable blocklists, and AI threat analysis. Pro ($99/mo) adds the SSE stream, webhooks, and STIX/TAXII.

Can I subscribe to alerts when new CVEs match my stack?

Yes — that is what CVE Watch is for. You define perimeters of CPE strings (the products and versions you run) and we continuously match new CVEs to those perimeters. Alerts are delivered via dashboard, email, webhook, or the SSE stream.

Is the API public?

The /api/cve and /api/cve/recent endpoints are publicly accessible (rate-limited) so you can integrate without an API key for low-volume usage. Higher-volume access requires registration and a free or paid plan.

How do I cite or link to a single CVE?

Every CVE in the catalog gets a stable canonical page at https://ismalicious.com/cve/CVE-YYYY-NNNNN with full metadata, JSON-LD, and links to the original NVD/KEV/CERT-FR/MSRC/GHSA references.

Wire CVE intel into your stack

Free API key, 30 checks/month, no credit card. Bulk and stream endpoints available on Basic and Pro.