The CVE Program aims to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities, with a total of 233,151 CVE records available. The program is transitioning to a new website at WWW.CVE.ORG and a JSON format for CVE records.
FEATURES
SIMILAR TOOLS
A local privilege escalation vulnerability in the Linux kernel known for its catchy name and potential damages.
A BloodHoundAD Report Engine for Security Teams to identify Active Directory security vulnerabilities and harden common configuration vulnerabilities and oversights.
A tool that detects dangling DNS records in a multi-cloud environment to prevent subdomain takeovers.
Donate to your favorite open-source projects and charities using PayPal
A tool that uses NLP and ML to identify potential software vulnerabilities from git commit messages
A tool that showcases the attack surface of a given Android device, highlighting potential vulnerabilities and security risks.
A repository containing hourly-updated data dumps of bug bounty platform scopes
A demonstration site for the Acunetix Web Vulnerability Scanner, intentionally vulnerable to various web-based attacks.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.