CVE Tools
325.8K
Total CVEs
Accepted into database
41.2K
Critical
CVSS ≥ 9.0
65.4K
With Exploits
Linked to PoC or exploit code
1.6K
In CISA KEV
Known Exploited Vulnerabilities
22.6K
High EPSS
Exploit probability > 10%
50.3K
Nuclei Templates
Scanner templates linked to CVEs

All numbers are live. Our sync pipeline pulls the latest CVE data from GitHub's CVEProject repository and enriches it automatically.

Sign in to search →

Search across 325.8K CVEs by ID, description, vendor, CWE, or natural language query. Powered by semantic search — describe what you're looking for, and we'll find it.

Everything you need to work with vulnerabilities

CVE Tools is not just a database — it's a complete vulnerability intelligence workstation. Every CVE is enriched, linked, and queryable through multiple interfaces.

CVE Database

Continuously synced from the official CVEProject repository. Every record includes CVSS scores, affected products, CPE identifiers, CWE weaknesses, and full version range details. Filter by severity, vendor, date range, exploit availability, and more.

Exploit Intelligence

Automatically discovers and links proof-of-concept exploits from GitHub repositories, ExploitDB entries, and Metasploit modules. Know instantly which CVEs have weaponized code available — and how mature it is.

Nuclei Templates

Community-maintained and AI-generated Nuclei scanner templates mapped to specific CVEs. Use them to validate whether your infrastructure is affected, or generate new templates with the AI assistant.

EPSS Scoring

Every CVE includes its EPSS (Exploit Prediction Scoring System) score from FIRST.org, updated regularly. Prioritize remediation by real-world exploit probability — not just theoretical severity.

CISA KEV Tracking

Tracks the Known Exploited Vulnerabilities catalog maintained by CISA. Flag CVEs that are confirmed exploited in the wild and that US federal agencies are mandated to patch.

Attack Surface Graph

Interactive visualization mapping products to CVEs to MITRE ATT&CK techniques and kill chain stages. Understand not just what's vulnerable — but how an attacker would chain it.

AI Assistant

Chat with an AI security analyst about any CVE. Ask for impact analysis, get remediation recommendations, compare vulnerabilities, generate detection rules, or query the database in plain English.

MCP Server & REST API

Integrate CVE Tools into your workflow. Use the Model Context Protocol server with Claude, Cursor, or any MCP-compatible tool. Or call the REST API directly from your scripts, SIEM, or ticketing system.

See what's inside

From a searchable database with deep filters to an AI analyst you can talk to — every screen is built for security teams that need answers fast.

apache authentication bypass⌘K
847 results
CVE IDVendor / ProductCVSSEPSSFlags
CVE-2025-21298
Microsoft
Windows OLE
9.894.2%
KEVEXPNUC
CVE-2025-0282
Ivanti
Connect Secure
9.089.1%
KEVEXPNUC
CVE-2024-55591
Fortinet
FortiOS SSL-VPN
9.676.3%
KEVNUC
CVE-2024-49113
Apache
Struts 2.x
8.141.7%
EXP
CVE-2024-47575
Fortinet
FortiManager
9.888.0%
KEVEXP
CVE-2024-38094
Microsoft
SharePoint Server
7.237.5%
KEVEXP
847 results · page 1 of 85
12385

Find exploitable CVEs
in seconds, not hours

250,000+ CVEs with a sidebar packed with filters. Combine KEV status, exploit availability, EPSS range, CWE, vendor, attack vector, and date range. Sub-50ms results via Typesense.

  • Priority heatmap: see the critical/high/medium split before you touch a filter
  • Active filter chips — always know what is applied, remove in one click
  • Faceted counts on every option: "CISA KEV (1,247)" — no empty results
  • Save named presets — reload your daily triage view instantly
Powered by Typesense — sub-50ms full-text + facet search

Attack surface in real time

This graph is built automatically from the 3 most recent critical CVEs in our database. It maps affected products through vulnerabilities to MITRE ATT&CK techniques and kill chain stages — showing not just what's broken, but how it could be exploited.

Latest Critical CVEs & Attack Paths

CVE-2026-403229.0

siyuan-note/siyuan

SiYuan: Mermaid `javascript:` Link Injection Leads to Stored XSS and Electron RCE

T1190 Exploit Public-Facing ApplicationT1059 Command and Scripting InterpreterT1189 Drive-by Compromise
CVE-2026-63509.8

Openfind/MailAudit

Openfind|MailGates/MailAudit - Stack-based Buffer Overflow

T1068 Exploitation for Privilege Escalation
CVE-2026-35969.8

imprintnext/Riaxe Product Customizer

Riaxe Product Customizer <= 2.1.2 - Missing Authorization to Unauthenticated Arbitrary Options Update to Privilege Escalation via 'install-imprint' AJAX Action

T1078 Valid AccountsT1190 Exploit Public-Facing Application

This graph updates automatically when new critical CVEs are discovered and enriched.

Real exploit code, linked to every CVE

We continuously scan multiple exploit sources and link them to CVEs in our database. When a new proof-of-concept appears on GitHub, a Metasploit module gets published, or a Nuclei template is created — we pick it up and connect it to the right vulnerability automatically.

GitHub PoC
29,625
Public proof-of-concept repositories
ExploitDB
15,178
Verified exploit entries
Metasploit
112
Framework modules
Nuclei
12
Scanner templates

Exploit data is refreshed alongside CVE sync. New links appear within hours of public disclosure.

Years of vulnerability data, continuously growing

Our database covers CVEs from 1999 to present. The chart below shows accepted CVE counts by publication year. The current year updates in real time as new vulnerabilities are published and synced.

2021
20,544
2022
25,237
2023
29,010
2024
40,002
2025
46,409
2026
17,130

The most frequently affected vendors in our database — and counting.

GitlabThemeum

Where the data comes from

CVE Tools aggregates, enriches, and structures vulnerability data from authoritative sources. Every record passes through our parsing, scoring, and enrichment pipeline before entering the database.

CVEProject / cvelistV5
9m ago
339.5K

Official CVE database from CVE Numbering Authorities. Synced from GitHub repository.

NVD
9m ago
345.0K

NIST National Vulnerability Database. CVSS scoring, CPE matching, and CWE classification.

BDU FSTEC
27d ago
83.8K

Russian FSTEC vulnerability database. Independent severity assessments and remediation data.

GHSA
9m ago
29.1K

GitHub Security Advisories. OSV-format advisories with ecosystem-specific impact data.

Nuclei Templates
8m ago
115.3K

ProjectDiscovery scanner templates. Actionable detection rules linked to CVEs.

CISA KEV
3m ago
1.6K

CISA Known Exploited Vulnerabilities catalog. Confirmed active exploitation in the wild.

More sources

OSV, VulnDB, and ZDI integrations are in development. New sources are added as modular pipeline stages.

Total source records914.1K

Pipeline

Processing

Each CVE is parsed, scored by CVSS, classified by priority, matched to affected products via CPE, and enriched with exploit and threat intelligence data.

Filtering

Only CVEs meeting the severity threshold (CVSS ≥ 7.0 by default) are accepted into the database. Reserved and disputed entries are excluded.

CVSS Score Distribution

0-2
623
2-4
13,724
4-6
97,734
6-8
139,854
8-10
73,899

Distribution across 325,834 accepted CVEs

Ready to dive in?

Create a free account to access the full CVE database, AI-powered analysis, exploit intelligence, attack surface visualization, and API integrations. No credit card required.

Full CVE database access AI assistant Exploit links Attack surface graphs REST API & MCP