CVEs (New/Updated)
Since yesterday
Last 7 days
Last 30 days
Known exploited vulnerabilities
Since yesterday
Last 7 days
Last 30 days
Recent EPSS score changes
>5%
>10%
>50%
Distribution of vulnerabilities by CVSS scores
CVSS Score Range Vulnerabilities
0-1
 
287
1-2
 
207
2-3
 
1018
3-4
 
2068
4-5
 
14010
5-6
 
26308
6-7
 
25766
7-8
 
40400
8-9
 
18013
9+
 
30505
Total 158582
Weighted Average CVSS Score: 7.6
* For CVEs published in the last 10 years
Welcome to the new CVEdetails.com!

After many years with the same look and functionality, it was time for a full update of both functionality and the user interface.

We are still actively working on updates and we will be adding new features and making changes in the coming months too. Some key features, such as user registration and sign in, are still under development and will be disabled until new versions are ready.

See what's new page for more information what has been done and what we are working on.

Most of the functionality has been rewritten and might be slightly different from before, but key functionality has been preserved.

Feel free to reach us at [email protected] if you have any questions/concerns or feedback.

What is Threat Intelligence?
Threat intelligence is one of our most potent weapons against digital hazards. Yet, many organizations remain uncertain about what it entails, how to apply it effectively, and what threat intelligence solution to choose. This lack of understanding could be detrimental as cyber threats continue to evolve, becoming more sophisticated and disruptive... Read more
What is Cyber Threat Hunting?
Cyber threat hunting is a proactive security strategy that involves searching for threats within a network before they can cause significant damage. Unlike traditional methods, which are reactive and wait for an alert before taking action, threat hunting seeks to actively identify and mitigate hidden threats that have evaded initial security measures. Threat hunting involves constant monitoring and data analysis to spot suspicious behavior that may indicate a cyber attack... Read more
This web site uses cookies for managing your session and website analytics (Google analytics) purposes as described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!