Search Guide
How to find vulnerabilities, exploits, and PoC code across 337,098 CVEs and 77,202 exploits.
Basic Search
Type any keyword in the search box and hit Enter. The search uses full-text search across CVE titles, descriptions, vendor names, and product names.
Tips
Search is case-insensitive -- "Log4j", "log4j", and "LOG4J" all return the same results.
Multiple words are matched with AND logic -- "apache log4j" finds entries containing both words.
To search by CVE ID, type the full ID (e.g. CVE-2024-3400) for an exact match.
Quick Filters
Click the filter pills below the search box to instantly narrow results. Filters can be combined with each other and with text search.
Combining filters
Critical + With Exploits -- the most dangerous: critical CVEs with public exploit code (3,943)
Critical + CISA KEV -- critical severity CVEs known to be actively exploited (527)
Critical + Ransomware -- critical CVEs with confirmed ransomware use
Exploited + PoC Available -- exploited in the wild AND has public exploit code
High EPSS + Exploits -- CVEs with >70% exploitation probability and available PoC
Example Queries
Real-world search scenarios showing how to combine filters.
API Search
All search features are available via the REST API. The same filters work as query parameters.
Text search:
curl 'https://exploit-intel.com/api/v1/vulns?q=log4j'
Combined filters:
curl 'https://exploit-intel.com/api/v1/vulns?vendor=apache&has_exploits=true&severity=critical'
Date range with ecosystem:
curl 'https://exploit-intel.com/api/v1/vulns?ecosystem=npm&date_from=2026-01-01&min_cvss=7.0'