Threat Intelligence

CVE
Database

> searchsploit --cve "CVE-2024-*" --json | jq '.RESULTS_EXPLOIT[]'_

Search over 250,000 catalogued vulnerabilities in the National Vulnerability Database. Find CVEs by keyword, product, vendor, or severity — and understand which ones your organisation needs to act on.

Every vulnerability, catalogued and scored.

The Common Vulnerabilities and Exposures (CVE) system is the industry-standard reference for publicly known security vulnerabilities. Each CVE gets a unique identifier, a description, and — in most cases — a CVSS severity score that quantifies the risk. This page lets you search the full NVD catalogue to find vulnerabilities relevant to your technology stack.

Use the search below to look up specific CVE IDs, product names, vendor names, or vulnerability types. Filter by severity to focus on what needs your attention first.

Search Tips

Try searching for product names like "Apache", "Microsoft Exchange", or "OpenSSL". You can also search for specific CVE IDs like "CVE-2024-21410" or vulnerability types like "SQL injection" or "remote code execution".


Find vulnerabilities.


Anatomy of a CVE entry.

CVE Identifier
A unique ID in the format CVE-YYYY-NNNNN. The year indicates when the vulnerability was assigned (not necessarily when it was discovered or disclosed). These IDs are permanent and globally recognised.
CVSS Score
The Common Vulnerability Scoring System rates each CVE from 0.0 to 10.0 based on exploitability, impact, and attack complexity. Scores of 9.0+ are Critical — meaning trivial exploitation with catastrophic impact.
CWE Classification
Common Weakness Enumeration tags categorise the type of flaw — injection, buffer overflow, authentication bypass, and so on. CWE helps you understand the root cause, not just the symptom, so you can fix the pattern across your codebase.
References
Each CVE includes links to vendor advisories, proof-of-concept exploits, patches, and technical write-ups. These references are your roadmap from "we're affected" to "we've fixed it".

From knowledge to action.


Found something concerning?

If you've found CVEs that might affect your organisation, the next step is verification. Our penetration testers will confirm whether you're vulnerable — and show you exactly how to fix it.