Vulners--All-in-one vulnerability intelligence
Prioritize remediation efforts with rich context beyond the CVSS.
Drive offensive and defensive efforts with the latest updates on exploits.
Integrate vulnerability intelligence delivered in normalized and correlated machine-readable format.
At Vulners core is a graph database with a robust API allowing
Precise search of vulnerabilities by CPE, name/version, or using full-text search
Getting all metrics like CVSS, EPSS,Vulners AI Score, CWE, exploited in the wild, and more with one call
Retrieving interlinked information about exploits, news, and blog posts
See how our API works — examples of queries with real responses
1. Get full document by ID
2. Full text search in the Database
3. Get vulnerabilities by CPE
4. Get vulnerabilities by product & version
5. Search Exploits
References
Documents in the database that reference the vulnerability
Is Wild Exploited
Vulnerability included in the CISA KEV list or there are other exploitation evidence
Social networks activity
Actively discussed vulnerabilities often pose more risk
Vulners AI Score
Vulnerability impact estimation with our proprietary machine learning model
AI Tags
ChatGPT-powered classification of vulnerabilities for easy search and analysis
Exploits PoC
Interlinked information about exploits PoC on popular resources
Documents Hisory
We track and store all changes to CVE and other documents in the database
CVSS
Vector and Base Score assigned by CNA and NVD
EPSS
Probability of vulnerability exploitation in the next 30 days
Start using an API-first vulnerability intelligence platform
Designed for cybersecurity professionals like you
Power Your Products and Operations
Whether you're developing cybersecurity products or running an MSSP operation, our normalized and correlated vulnerability intelligence data streamlines your processes, all in a machine-readable format
Supercharge Your Vulnerability Management
Don't just rely on CVSS scores. We provide rich context to help you prioritize remediation efforts, ensuring maximum impact on risk reduction
Stay Ahead of Threats
Keep your defenses robust and your offensive strategies informed with our real-time updates on the latest exploits and vulnerabilities
© Copyright 2000-2023 COGITO SOFTWARE CO.,LTD. All rights reserved