Home/Tools/Security/CVE Vulnerability Search

CVE Vulnerability Search

Search and analyze CVE vulnerabilities with CVSS calculator, affected products, and remediation guidance from NVD database.

Loading CVE Vulnerability Search...

Choose tool view

Loading interactive tool & charts...

Tracking Vulnerabilities Manually?

Our vulnerability management service provides continuous scanning and prioritized remediation guidance.

What Is CVE Lookup

CVE (Common Vulnerabilities and Exposures) is a standardized system for identifying and cataloging publicly disclosed cybersecurity vulnerabilities. Each vulnerability receives a unique identifier in the format CVE-YYYY-NNNNN (e.g., CVE-2024-3094), enabling security professionals, vendors, and researchers to reference the exact same vulnerability without ambiguity.

Maintained by the MITRE Corporation under sponsorship from the U.S. Department of Homeland Security, the CVE program has cataloged over 200,000 vulnerabilities since its inception in 1999. This tool allows you to search the CVE database to understand vulnerabilities affecting your systems, assess their severity, and prioritize remediation.

How the CVE System Works

When a vulnerability is discovered, it follows a structured disclosure process:

  1. Discovery — A researcher, vendor, or automated scanner identifies a security flaw
  2. CVE ID Assignment — A CVE Numbering Authority (CNA) assigns a unique CVE ID. Major vendors like Microsoft, Google, and Red Hat are CNAs for their own products.
  3. Publication — The CVE entry is published with a description, affected products, and references
  4. Scoring — The vulnerability receives a CVSS score indicating its severity (see CVSS Calculator tool)
  5. Remediation — Vendors release patches, and organizations prioritize deployment based on severity and exposure
CVE FieldDescriptionExample
CVE IDUnique identifierCVE-2024-3094
DescriptionTechnical summary of the flawBackdoor in xz/liblzma compression library
CVSS ScoreSeverity rating (0.0-10.0)10.0 (Critical)
CWEWeakness classificationCWE-506: Embedded Malicious Code
ReferencesLinks to advisories and patchesVendor advisory, NVD entry
Affected ProductsCPE identifiers for impacted softwarecpe:2.3:a:tukaani:xz:5.6.0

Common Use Cases

  • Vulnerability management: Search for CVEs affecting your software inventory and prioritize patching by CVSS score
  • Incident response: When a new critical CVE is announced, quickly assess whether your organization is affected
  • Vendor risk assessment: Review the CVE history of third-party software before procurement decisions
  • Penetration testing: Research known vulnerabilities for target systems during authorized security assessments
  • Compliance reporting: Document known vulnerabilities and remediation timelines for auditors (PCI DSS Requirement 6, NIST CSF)
  • Threat intelligence: Track CVE publications to identify emerging attack trends targeting your technology stack

Best Practices

  1. Monitor CVE feeds continuously — Subscribe to NVD data feeds, vendor security advisories, and CISA Known Exploited Vulnerabilities (KEV) catalog for real-time awareness.
  2. Cross-reference with CISA KEV — Not all CVEs are actively exploited. The CISA KEV catalog identifies vulnerabilities with confirmed exploitation in the wild — prioritize these for immediate patching.
  3. Maintain a software inventory — You cannot assess CVE impact without knowing what software you run. Use SBOM (Software Bill of Materials) tools to maintain accurate inventories.
  4. Use CVSS as a starting point, not the final word — A CVSS 9.8 vulnerability in software you don't use is lower priority than a CVSS 7.0 in your internet-facing application. Contextualize scores based on your environment.
  5. Track remediation SLAs — Define and enforce patching timelines based on severity: Critical (24-72 hours), High (1-2 weeks), Medium (30 days), Low (next maintenance window).

References & Citations

  1. MITRE Corporation. (2024). Common Vulnerabilities and Exposures (CVE) Program. Retrieved from https://cve.mitre.org/ (accessed January 2025)
  2. NIST. (2024). National Vulnerability Database (NVD). Retrieved from https://nvd.nist.gov/ (accessed January 2025)
  3. FIRST.org. (2019). CVSS v3.1 Specification Document. Retrieved from https://www.first.org/cvss/v3.1/specification-document (accessed January 2025)
  4. CISA. (2024). CISA Known Exploited Vulnerabilities Catalog. Retrieved from https://www.cisa.gov/known-exploited-vulnerabilities-catalog (accessed January 2025)

Note: These citations are provided for informational and educational purposes. Always verify information with the original sources and consult with qualified professionals for specific advice related to your situation.

Frequently Asked Questions

Common questions about the CVE Vulnerability Search

CVE (Common Vulnerabilities and Exposures) is a standardized identifier for known security vulnerabilities. Format: CVE-YEAR-NUMBER (e.g., CVE-2021-44228 for Log4Shell). Purpose: (1) Universal reference - Same vulnerability ID used across all vendors and security tools. (2) Coordination - Researchers, vendors, and users can discuss same vulnerability unambiguously. (3) Tracking - Monitor vulnerabilities affecting your systems. (4) Automation - Security scanners reference CVE IDs in reports. Managed by: MITRE Corporation maintains CVE system, CVE Numbering Authorities (CNAs) assign IDs, National Vulnerability Database (NVD) provides additional analysis. Lifecycle: (1) Researcher discovers vulnerability, (2) CNA assigns CVE ID (pre-disclosure), (3) Vendor develops patch, (4) Public disclosure with CVE, (5) NVD adds CVSS score and details. Usage: Vulnerability scanners (Nessus, Qualys) report CVEs, Patch management systems prioritize by CVE severity, Compliance audits track CVE remediation, Security advisories reference CVEs. Over 200,000 CVEs assigned since 1999. Critical tool for vulnerability management programs.

CVSS (Common Vulnerability Scoring System) quantifies vulnerability severity from 0.0-10.0. CVSS v3.1 Components: (1) Base Score (never changes): Attack Vector (Network/Adjacent/Local/Physical), Attack Complexity (Low/High), Privileges Required (None/Low/High), User Interaction (None/Required), Scope (Unchanged/Changed), Impact on Confidentiality/Integrity/Availability (None/Low/High). (2) Temporal Score (changes over time): Exploit Code Maturity, Remediation Level, Report Confidence. (3) Environmental Score (organization-specific): Modified Base metrics, Confidentiality/Integrity/Availability Requirements. Severity Ratings: 0.0: None, 0.1-3.9: Low, 4.0-6.9: Medium, 7.0-8.9: High, 9.0-10.0: Critical. Example: CVE-2021-44228 (Log4Shell) - Base Score: 10.0 (Critical), Attack Vector: Network (worst case), Attack Complexity: Low (easy to exploit), Privileges Required: None, User Interaction: None, Scope: Changed (can attack other systems), Impact: High across all three (C/I/A). Limitations: Doesn't account for asset value, ignores actual exploit likelihood in your environment, doesn't consider compensating controls. Best practice: Use CVSS as starting point, adjust based on your risk assessment, prioritize based on exploitability and asset criticality.

Multiple methods to identify relevant CVEs: Method 1: Vulnerability Scanners - Nessus, Qualys, Rapid7, OpenVAS scan systems, match installed software versions to CVE database, provide prioritized remediation lists. Method 2: Software Composition Analysis (SCA) - Snyk, WhiteSource, Black Duck analyze application dependencies, identify vulnerabilities in libraries (npm, Maven, PyPI), integrate with CI/CD pipelines. Method 3: Manual CVE Search - Search NVD by product name (cpe:2.3:a:apache:log4j:2.14.1), use this CVE lookup tool, check vendor security advisories, subscribe to CVE feeds. Method 4: Package Managers - npm audit, pip-audit, cargo audit check language-specific packages. Method 5: OS Security Updates - Red Hat Security Advisories, Ubuntu Security Notices, Windows Update lists CVEs. Best practices: (1) Maintain software inventory (SBOM - Software Bill of Materials), (2) Subscribe to vendor security mailing lists, (3) Automate vulnerability scanning weekly, (4) Prioritize internet-facing systems, (5) Test patches in staging before production. For critical CVEs: CISA Known Exploited Vulnerabilities (KEV) catalog lists actively exploited CVEs requiring immediate patching. Monitor CVE-2021-44228 (Log4Shell), CVE-2023-22515 (Atlassian), CVE-2023-34362 (MOVEit) type incidents.

CVE and CWE serve different purposes in vulnerability management: CVE (Common Vulnerabilities and Exposures) - Identifies specific vulnerability instances, unique ID for each discovered vulnerability, example: CVE-2023-12345 in specific product version, focuses on "what" is vulnerable. CWE (Common Weakness Enumeration) - Categories of vulnerability types, reusable classification of security flaws, example: CWE-89 SQL Injection, focuses on "why" vulnerability exists. Relationship: CVEs map to CWEs (one CWE can have many CVEs), CVE-2021-44228 (Log4Shell) maps to CWE-20 (Improper Input Validation) and CWE-502 (Deserialization). CWE Top 25 (most dangerous weaknesses): CWE-79: Cross-Site Scripting (XSS), CWE-89: SQL Injection, CWE-20: Improper Input Validation, CWE-78: OS Command Injection, CWE-787: Out-of-bounds Write. Usage: Developers: Learn CWEs to avoid vulnerability classes, Security teams: Track CVE instances requiring patching, Researchers: Categorize findings with CWEs, Training: Teach CWE patterns. Analogy: CWE is the disease category (influenza), CVE is the specific outbreak (2023 flu strain affecting specific population). Both maintained by MITRE, complementary systems for vulnerability classification and management.

Patch timelines vary greatly by severity and vendor: Industry averages: Critical vulnerabilities: 7-30 days, High severity: 30-90 days, Medium/Low: 90-365 days or never. Factors affecting timeline: (1) Complexity - Simple fixes (config) vs code refactoring vs architecture changes. (2) Vendor resources - Large vendors (Microsoft, Google) faster than small projects. (3) Open-source - Can be hours (community) or years (abandoned projects). (4) Exploitation status - Active exploitation speeds up patching, proof-of-concept code increases urgency, theoretical vulnerabilities lower priority. Notable examples: Log4Shell (CVE-2021-44228): Initial patch 48 hours (but incomplete, multiple updates needed), Microsoft Exchange ProxyLogon: Patch released before public disclosure (0-day prevention), Heartbleed (CVE-2014-0160): Patch same day as disclosure but 2+ years for internet cleanup. Responsible disclosure: 90-day standard (Google Project Zero, CERT), vendors receive private notification, patch developed before public disclosure, extension possible for complex fixes. If no patch available: Apply compensating controls (WAF rules, network isolation), monitor for exploitation attempts, consider alternative software, pressure vendor for timeline. Patch validation: Test in staging environment, check for regression issues, monitor for incomplete fixes (patch Tuesday). Some CVEs never get patches (EOL software, theoretical issues, vendor disagreement on severity).

0-day (zero-day) vulnerabilities are unknown to vendors and lack patches: 0-day lifecycle: (1) Discovery - Researcher or attacker finds vulnerability, no public knowledge, no patch available. (2) CVE assignment - CNA can reserve CVE ID before disclosure (helps coordination), CVE marked "reserved" in public database. (3) Exploitation - Attackers may exploit before patch (zero days to prepare defense), highly valuable on black market ($100K-$1M+). (4) Disclosure - Vendor notified (responsible) or public disclosure (full disclosure), race to patch begins. (5) Patch released - Now a "1-day" or N-day vulnerability, attackers rush to exploit before patches deployed. CVE handling: Reserved CVE (pre-disclosure): Only ID public, details withheld, Published CVE (post-disclosure): Full details in NVD database. Famous 0-days: Stuxnet: Used 4 Windows 0-days simultaneously, NSA exploits: Leaked by Shadow Brokers (EternalBlue), iPhone jailbreaks: Often use 0-day chains. Defense strategies: (1) Defense-in-depth (assume breach), (2) Behavior-based detection (EDR tools), (3) Network segmentation, (4) Rapid patch deployment capability, (5) Virtual patching (WAF, IPS rules). Bug bounty programs: Microsoft, Google, Apple pay for 0-day disclosure, prevents black market sales, typical payout: $10K-$250K depending on severity. 0-days are highest priority when discovered in-the-wild.

Effective CVE prioritization prevents "patch fatigue" and focuses resources: Priority 1: Critical + Exploited - CVSS 9.0-10.0 with public exploit, active exploitation in-the-wild (check CISA KEV list), internet-facing systems, no compensating controls available. Patch within 24-48 hours. Priority 2: High + Easy to Exploit - CVSS 7.0-8.9 with low attack complexity, proof-of-concept code available, affects critical business systems, remote exploitation possible. Patch within 7-14 days. Priority 3: High + Internal Only - High severity but requires local access, systems not internet-facing, compensating controls in place, affects non-critical systems. Patch within 30 days. Priority 4: Medium + Widespread - Medium severity affecting many systems, potential for privilege escalation, chained with other vulnerabilities, affects important data. Patch within 60 days. Priority 5: Low/Medium + Limited Exposure - Low severity or highly constrained exploitability, requires multiple preconditions, affects isolated systems, theoretical vulnerabilities. Patch during normal maintenance cycles. Risk-based approach: Asset value × Threat likelihood × Vulnerability severity = Priority score. Tools for prioritization: CVSS Environmental Scoring (adjust for your environment), EPSS (Exploit Prediction Scoring System), Tenable VPR, Kenna Security Risk Score. Real-world factors: Compliance requirements, business disruption from patching, availability of patches, testing requirements. Best practice: Don't try to patch everything immediately, focus on internet-exposed critical assets, automate low-risk patching, test critical patches before deployment.

CNAs are organizations authorized to assign CVE IDs: Primary CNA - MITRE Corporation (original CVE authority), assigns CVEs when no other CNA applicable, coordinates the overall CVE program. Types of CNAs: (1) Vendor CNAs - Microsoft, Apple, Google, Oracle, Red Hat assign CVEs for their own products, understand impact and fix timelines, coordinate with security teams. (2) Researcher CNAs - GitHub Security Lab, Google Project Zero, Trend Micro Zero Day Initiative, discover vulnerabilities in various products. (3) Bug Bounty CNAs - HackerOne, Bugcrowd facilitate disclosure and CVE assignment. (4) National CNAs - CERT/CC (US), JPCERT (Japan), coordinate country-specific disclosures. (5) Open Source CNAs - Kubernetes Security Team, Python Security Response Team, Apache Security Team. CNA process: (1) Researcher reports vulnerability to CNA, (2) CNA validates it's a genuine security issue, (3) CNA assigns CVE ID (CVE-YYYY-NNNNN), (4) CNA coordinates disclosure with affected vendors, (5) CNA publishes details to NVD. Benefits of CNA system: Faster CVE assignment (vendors can self-assign), better coordination, more accurate initial information, reduced MITRE workload (200K+ CVEs managed). For researchers: Report to appropriate CNA, faster ID assignment, better vendor coordination. CVE ID Structure: CVE-2024-12345: 2024 = year requested (not disclosed), 12345 = sequential number within year, 4-digit minimum, up to 7 digits for busy years. As of 2024, there are 300+ CNAs worldwide, assigning ~25,000 new CVEs per year.

⚠️ Security Notice

This tool is provided for educational and authorized security testing purposes only. Always ensure you have proper authorization before testing any systems or networks you do not own. Unauthorized access or security testing may be illegal in your jurisdiction. All processing happens client-side in your browser - no data is sent to our servers.

CVE Lookup - CVE Vulnerability Database Search | Inventive HQ