Vulnerability Intelligence

Vulnerability research and databases

Filter Security Solutions

VulnDB

McLean, VA, US
Verified Business

Commercial vulnerability database with detailed technical information and remediation guidance.

Asset-Specific Vulnerability Feeds

Vulners

Wilmington, DE, US
Verified Business

Vulnerability database and patch management intelligence platform with API access.

Patch Intelligence

Exploit Database

New York, NY, US
Verified Business

Archive of public exploits and vulnerable software maintained by Offensive Security.

Exploit Databases

Zerodium

Washington, DC, US
Verified Business

Premium zero-day acquisition platform paying researchers for high-impact vulnerabilities.

Zero-Day Research

China National Vulnerability Database

Beijing, Beijing, CN
Verified Business

Chinese national vulnerability database for security information sharing.

CVE Databases

Open Source Vulnerability Database

Walnut, CA, US
Verified Business

Independent open source vulnerability database project.

CVE Databases

Full Disclosure

Mountain View, CA, US
Verified Business

Public security mailing list for detailed vulnerability disclosure.

CVE Databases

Packet Storm Security

Wilmington, DE, US
Verified Business

Information security portal with exploits, advisories, and security tools.

CVE Databases

SecurityFocus

Mountain View, CA, US
Verified Business

Vulnerability database and security information portal by Symantec.

CVE Databases

CVE Details

San Francisco, CA, US
Verified Business

Free CVE security vulnerability database with easy search and statistics.

CVE Databases

VulDB

Aarau, Aargau, CH
Verified Business

Vulnerability database documenting and explaining security vulnerabilities.

CVE Databases

MITRE CVE

Bedford, MA, US
Verified Business

Common Vulnerabilities and Exposures dictionary of publicly known security vulnerabilities.

CVE Databases

NVD

Gaithersburg, MD, US
Verified Business

National Vulnerability Database - U.S. government repository of standards-based vulnerability data.

CVE Databases

Vulnerability intelligence encompasses comprehensive information about security weaknesses in software, systems, and infrastructure components, enabling organizations to understand, prioritize, and remediate security exposures before they can be exploited by threat actors. This intelligence combines technical vulnerability details with exploit availability, threat context, and business impact assessments to support informed security decision-making and risk management processes.

The vulnerability intelligence domain includes Common Vulnerabilities and Exposures (CVE) databases, zero-day vulnerability research, proof-of-concept exploit repositories, vendor security advisories, patch intelligence services, and asset-specific vulnerability feeds. Intelligence sources provide vulnerability scoring, exploitability assessments, threat intelligence correlation, and remediation guidance that enables security teams to prioritize patching efforts based on actual risk rather than theoretical vulnerability scores alone.

Organizations leverage vulnerability intelligence to accelerate vulnerability management programs, prioritize patching based on actual threat activity, understand which vulnerabilities are being actively exploited, correlate vulnerability exposure with threat actor tactics, and make informed decisions about security control implementations. This intelligence-driven approach enables more effective resource allocation, faster time-to-patch for critical vulnerabilities, and improved overall security posture through data-driven vulnerability management strategies.