Vulnerability Intelligence

Vulnerability research and databases

Filter Security Solutions

VulnDB

McLean, VA, US
Verified Business

VulnDB is a commercial vulnerability intelligence database providing detailed technical information, exploit data, and remediation guidance for security professionals.

Asset-Specific Vulnerability Feeds

Vulners

Wilmington, DE, US
Verified Business

Vulners provides a comprehensive vulnerability database and patch management intelligence platform with API access for security teams and developers.

Patch Intelligence

Exploit Database

New York, NY, US
Verified Business

Exploit Database is a comprehensive public archive of exploits and vulnerable software maintained by Offensive Security for security research and penetration testing.

Exploit Databases

Zerodium

Washington, DC, US
Verified Business

Zerodium operates as a premium zero-day acquisition platform that purchases high-impact vulnerabilities from security researchers for defensive intelligence purposes.

Zero-Day Research

China National Vulnerability Database

Beijing, Beijing, CN
Verified Business

China National Vulnerability Database (CNVD) serves as the country's official platform for vulnerability disclosure, threat intelligence sharing, and coordinated security research within the Chinese cybersecurity ecosystem.

CVE Databases

Open Source Vulnerability Database

Walnut, CA, US
Verified Business

Open Source Vulnerability Database (OSVDB) provides comprehensive vulnerability intelligence through community-driven research and independent security analysis.

CVE Databases

Full Disclosure

Mountain View, CA, US
Verified Business

Full Disclosure is a long-running public mailing list focused on detailed vulnerability disclosure and security research within the cybersecurity community.

CVE Databases

Packet Storm Security

Wilmington, DE, US
Verified Business

Packet Storm Security is a comprehensive information security portal providing exploit databases, security advisories, and penetration testing tools for cybersecurity professionals.

CVE Databases

SecurityFocus

Mountain View, CA, US
Verified Business

SecurityFocus serves as a comprehensive vulnerability database and security information portal operated by Symantec, providing detailed threat intelligence and security advisories.

CVE Databases

CVE Details

San Francisco, CA, US
Verified Business

CVE Details provides a free, comprehensive vulnerability database with advanced search capabilities and statistical analysis of Common Vulnerabilities and Exposures (CVE) data.

CVE Databases

VulDB

Aarau, Aargau, CH
Verified Business

VulDB is a comprehensive vulnerability database that documents, categorizes, and explains security vulnerabilities with detailed technical analysis and risk assessments.

CVE Databases

MITRE CVE

Bedford, MA, US
Verified Business

MITRE CVE is the industry-standard dictionary of publicly known cybersecurity vulnerabilities, providing unique identifiers and descriptions for security flaws across software and hardware systems.

CVE Databases

NVD

Gaithersburg, MD, US
Verified Business

The National Vulnerability Database (NVD) serves as the U.S. government's comprehensive repository of standardized vulnerability management data.

CVE Databases

Vulnerability intelligence encompasses comprehensive information about security weaknesses in software, systems, and infrastructure components, enabling organizations to understand, prioritize, and remediate security exposures before they can be exploited by threat actors. This intelligence combines technical vulnerability details with exploit availability, threat context, and business impact assessments to support informed security decision-making and risk management processes.

The vulnerability intelligence domain includes Common Vulnerabilities and Exposures (CVE) databases, zero-day vulnerability research, proof-of-concept exploit repositories, vendor security advisories, patch intelligence services, and asset-specific vulnerability feeds. Intelligence sources provide vulnerability scoring, exploitability assessments, threat intelligence correlation, and remediation guidance that enables security teams to prioritize patching efforts based on actual risk rather than theoretical vulnerability scores alone.

Organizations leverage vulnerability intelligence to accelerate vulnerability management programs, prioritize patching based on actual threat activity, understand which vulnerabilities are being actively exploited, correlate vulnerability exposure with threat actor tactics, and make informed decisions about security control implementations. This intelligence-driven approach enables more effective resource allocation, faster time-to-patch for critical vulnerabilities, and improved overall security posture through data-driven vulnerability management strategies.