Find answers to common questions about CVE data and our platform
Search by CVE ID: Use the exact format CVE-YYYY-NNNNN (e.g., CVE-2024-1234)
Search by Keyword: Enter vulnerability type or affected software (e.g., "sql injection" or "Apache")
Filter by Severity: Use our filters to show only HIGH or CRITICAL vulnerabilities
Filter by Date: Find vulnerabilities published within a specific time range
A CVE (Common Vulnerabilities and Exposures) is a unique identifier assigned to publicly disclosed cybersecurity vulnerabilities. Each CVE provides a reference for a specific vulnerability, allowing security professionals to communicate about threats effectively.
You can search for a specific CVE using the search bar on our homepage or navigate directly by typing the CVE ID in the URL. For example: /cve/CVE-2024-1234. You can also use our advanced search with filters for severity, date range, and keywords.
No, our service is completely free. We provide free access to CVE data, search functionality, and analysis tools for all users.
CVSS (Common Vulnerability Scoring System) scores range from 0-10 and indicate the severity of a vulnerability. Learn more in our CVSS Guide. Generally: 0-3.9 (Low), 4.0-6.9 (Medium), 7.0-8.9 (High), 9.0-10.0 (Critical).
EPSS (Exploit Prediction Scoring System) predicts the likelihood of a vulnerability being exploited, while CVSS measures the severity of impact. Both metrics are valuable for prioritization. See our EPSS Guide for details.
Our database is updated daily with new CVE information from the National Vulnerability Database (NVD). New vulnerabilities are added continuously as they are discovered and disclosed.
Our Executive Summary tool provides AI-generated, non-technical summaries of CVE vulnerabilities for stakeholders and leadership. These summaries explain the impact and importance without requiring deep technical knowledge.
The Remediation Guide provides step-by-step instructions for addressing specific vulnerabilities. It includes patching recommendations, workarounds, and best practices for securing systems against the identified threat.
Bulk Analysis allows you to analyze multiple CVEs at once. Upload a list of CVE IDs to get comprehensive analysis, including trends, severity distribution, and actionable recommendations.
No, our API is public and does not require authentication. However, rate limiting applies to ensure fair usage. See our API Documentation for details.
The API allows 50 requests per minute and 1,000 requests per hour per IP address. Rate limit information is provided in response headers.
Our API returns responses in JSON format, which is compatible with the National Vulnerability Database (NVD) API schema for seamless integration.
CVE IDs follow a specific format: CVE-YYYY-NNNNN. Ensure you are using the correct ID. If the CVE recently was published, there may be a short delay before it appears in our database.
Try broadening your search criteria. Make sure your keywords are spelled correctly and relevant to vulnerability descriptions. You can also try searching by date range instead of specific keywords.
Please contact us using our Contact form with details about the issue. We take data accuracy seriously and will investigate and correct any errors.
We do not store personally identifiable information or search history. See our Privacy Policy for complete details about data handling.
Yes, we use industry-standard security measures to protect our infrastructure. All data is from official sources (NVD, CISA) and we comply with security best practices.
Our data comes from public sources and can be used in most commercial applications. See our Terms of Service for specific licensing and usage rights.
Our AI-powered remediation feature provides intelligent, context-aware guidance for addressing vulnerabilities:
Access AI remediation by viewing any CVE detail page and clicking the "AI Remediation" button.
Export your CVE analysis and reports in multiple formats for easy integration with your workflow:
Export options are available on CVE detail pages and bulk analysis results.
Streamline your vulnerability management workflow with our JIRA-ready export format:
Click the "Copy for JIRA" button on any CVE detail page to get formatted content.
Create security issues in your GitHub repositories with pre-formatted vulnerability reports:
Use the "Create GitHub Issue" button on CVE detail pages to generate formatted content.
CVE information is provided for informational purposes. Always conduct thorough security assessments and consult with security professionals before taking action on vulnerabilities affecting your systems.
Can't find what you're looking for? Get in touch with our support team.
Send a Message