Search Guide

How to find vulnerabilities, exploits, and PoC code across 337,098 CVEs and 77,202 exploits.

Basic Search

Type any keyword in the search box and hit Enter. The search uses full-text search across CVE titles, descriptions, vendor names, and product names.

Query What it finds Results
log4j CVEs mentioning Log4j / Log4Shell 23
remote code execution RCE vulnerabilities across all products 30,749
CVE-2024-3400 Exact CVE ID lookup (Palo Alto PAN-OS) 1
fortinet ssl vpn Fortinet SSL VPN vulnerabilities 28
buffer overflow Buffer overflow / memory corruption bugs 24,786
wordpress plugin WordPress plugin vulnerabilities 16,593
Tips
Search is case-insensitive -- "Log4j", "log4j", and "LOG4J" all return the same results.
Multiple words are matched with AND logic -- "apache log4j" finds entries containing both words.
To search by CVE ID, type the full ID (e.g. CVE-2024-3400) for an exact match.

Quick Filters

Click the filter pills below the search box to instantly narrow results. Filters can be combined with each other and with text search.

Filter What it does Count
With Exploits Only CVEs that have at least one public exploit or PoC 53,389
CISA KEV Only CVEs in CISA's Known Exploited Vulnerabilities catalog 1,536
Exploited CVEs exploited in the wild (CISA KEV + VulnCheck KEV + InTheWild.io) 4,684
Ransomware CVEs with confirmed ransomware campaign use 563
Has Nuclei Only CVEs with Nuclei scanner templates for automated detection 3,912
Critical / High / Medium / Low Filter by CVSS v3 severity: critical (9.0-10.0), high (7.0-8.9), medium (4.0-6.9), low (0.1-3.9) 29,626
Combining filters
Critical + With Exploits -- the most dangerous: critical CVEs with public exploit code (3,943)
Critical + CISA KEV -- critical severity CVEs known to be actively exploited (527)
Critical + Ransomware -- critical CVEs with confirmed ransomware use
Exploited + PoC Available -- exploited in the wild AND has public exploit code
High EPSS + Exploits -- CVEs with >70% exploitation probability and available PoC

Sort Options

Sort Description
Newest Most recently published CVEs first (default)
CVSS Highest CVSS v3 score first -- find the most severe vulnerabilities
EPSS Highest EPSS score first -- find CVEs most likely to be exploited in the wild
Relevance Best text match first (only available when a search query is entered)

Advanced Search

Click the Advanced pill on the search page to expand additional filters. These can be combined with text search and quick filters.

Field Description Example
Vendor Filter by software vendor (partial match) apache, microsoft, fortinet
Product Filter by product name (partial match) log4j, exchange, chrome
Ecosystem Filter by package ecosystem (from GHSA data) npm, pypi, maven, go, rubygems, nuget
CWE Filter by weakness type (CWE ID) 79 (XSS), CWE-89 (SQLi), 787 (OOB Write)
Year Filter by CVE publication year 2024, 2025
Min CVSS Only CVEs with CVSS v3 score at or above this threshold 9.0 (critical only), 7.0 (high+)
Min EPSS Only CVEs with EPSS exploitation probability at or above this threshold 0.9 (top 1%), 0.5 (top 5%)
Published After Only CVEs published on or after this date 2026-01-01
Published Before Only CVEs published on or before this date 2025-12-31

API Search

All search features are available via the REST API. The same filters work as query parameters.

Text search:
curl 'https://exploit-intel.com/api/v1/vulns?q=log4j'
Combined filters:
curl 'https://exploit-intel.com/api/v1/vulns?vendor=apache&has_exploits=true&severity=critical'
Date range with ecosystem:
curl 'https://exploit-intel.com/api/v1/vulns?ecosystem=npm&date_from=2026-01-01&min_cvss=7.0'
Full API Documentation Rate Limits