About 112,000 results
Open links in new tab
  1. CVE: Common Vulnerabilities and Exposures

    There are currently over 310,000 CVE Records accessible via Download or Keyword Search above. The CVE Program partners with community members worldwide to grow CVE content and expand its …

  2. CVE security vulnerability database. Security vulnerabilities, exploits ...

    You can view CVE vulnerability details, exploits, references, metasploit modules, full list of vulnerable products and cvss score reports and vulnerability trends over time

  3. NVD - Search and Statistics

    For a phrase search, use " " Items per page:

  4. Database CVE, CWE, CISA KEV & Vulnerability Intelligence | CVE Find

    1 day ago · CVE Find is a cybersecurity intelligence platform indexing CVEs, CWEs, CAPEC, CVSS, EPSS and threat data. Search, track, and analyze known vulnerabilities and exploit risks.

  5. Known Exploited Vulnerabilities Catalog - CISA

    CVE-2026-20805 Microsoft Windows Information Disclosure Vulnerability: Microsoft Windows Desktop Windows Manager contains an information disclosure vulnerability that allows an authorized attacker …

  6. CVEs and Security Vulnerabilities - OpenCVE

    Explore the latest vulnerabilities and security issues in the CVE database

  7. NVD - Vulnerabilities

    The Common Vulnerabilities and Exposures (CVE) Program’s primary purpose is to uniquely identify vulnerabilities and to associate specific versions of code bases (e.g., software and shared libraries) …

  8. CVE Database - Security Vulnerabilities and Exploits | Vulners.com

    Vulnerability database enriched with millions CVE, exploits, articles, varied tools and services for vulnerability management against cybersecurity threats

  9. CVE Vault - CVE Database & Security Research Hub

    CVE Vault - Search and explore Common Vulnerabilities and Exposures (CVE) database. Find security vulnerabilities by CVE ID, vendor, severity, and year. Stay secure with comprehensive CVE information.

  10. Common vulnerabilities and Exposures (CVE)

    We're sorry but the CVE Website doesn't work properly without JavaScript enabled. Please enable it to continue.