CVE Databases Threat Intelligence
Common vulnerabilities databases
Filter by:
9 Results
China National Vulnerability Database
Chinese national vulnerability database for security information sharing.
Open Source Vulnerability Database
Independent open source vulnerability database project.
Full Disclosure
Public security mailing list for detailed vulnerability disclosure.
Packet Storm Security
Information security portal with exploits, advisories, and security tools.
SecurityFocus
Vulnerability database and security information portal by Symantec.
CVE Details
Free CVE security vulnerability database with easy search and statistics.
VulDB
Vulnerability database documenting and explaining security vulnerabilities.
MITRE CVE
Common Vulnerabilities and Exposures dictionary of publicly known security vulnerabilities.
NVD
National Vulnerability Database - U.S. government repository of standards-based vulnerability data.
CVE (Common Vulnerabilities and Exposures) databases provide standardized identification and documentation of publicly disclosed security vulnerabilities, offering organizations centralized access to vulnerability information, technical details, and impact assessments for known security flaws across software and hardware products. These databases serve as the foundation for vulnerability management programs and security tool integration through consistent vulnerability identifiers and structured data formats.
Major CVE databases include the National Vulnerability Database (NVD), MITRE CVE database, vendor-specific vulnerability databases, and commercial vulnerability intelligence platforms that enhance CVE data with additional context such as exploit availability, threat intelligence correlation, and remediation guidance. These databases provide vulnerability descriptions, affected product versions, CVSS scores, reference links, and machine-readable feeds for automated vulnerability management tool integration.
Organizations utilize CVE databases to maintain comprehensive vulnerability inventories, correlate security scanning results with known vulnerabilities, prioritize patching efforts based on vulnerability severity and exploitability, track vendor security advisory releases, and ensure compliance with vulnerability management requirements. CVE databases enable consistent vulnerability communication across security teams, vendors, and industry stakeholders while supporting automated vulnerability detection and remediation workflows.