CVEdetails.com supports much more than just CVEs now. Supported data sources/types:

  • CVE data
  • CISA KEV
  • Open Source Vulnerability format, https://ossf.github.io/osv-schema/, from multiple sources
  • Common Vulnerability Reporting Framework, CVRF, from multiple sources
  • Open Vulnerability and Assessment Language, OVAL, from multiple sources
  • Rss/Atom feeds
  • Various vendor APIs, including github, youtube etc
  • CPE, CWE, CAPEC, CVSS, EPSS
  • Web pages
  • Git repositories
  • Third party tool modules/plugins such as Metasploit, Nessus etc
  • More sources/formats are added regularly

URL data

We process urls discovered in other data, such as references, and save the following information about the web page, to make it easier for users to preview urls before visiting them.

  • A preview screenshot (blurred and not covering the whole page due to non-technical reasons)
  • Page title and description
  • Tags: key phrases extracted from the page

Full-text searching in all data, including processed urls, will be available in an upcoming release.

Data relations

Most structured data, such as CVEs, github advisories etc, contain reference information, e.g a Metasploit module references a CVE along with reference urls. We create a map of relations between data and allow users to view relations with a few clicks.

Data referenced by a metasploit module can be seen in the following example. Colored labels are used to highlight relation types.

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!