Skip to content
Tools / Vulnerability Database
Vulnerability Database icon

Vulnerability Database

Search CVEs & track new advisories

Vulnerability Database gives you searchable access to the full CVE catalog — every publicly disclosed security vulnerability, with CVSS severity scores, affected software versions, CWE weakness classifications, and links to official advisories. Look up a specific CVE, search by software name, or pull a daily feed of newly published vulnerabilities.

Security teams need this kind of access without building their own data pipeline. Whether you're auditing a dependency list, investigating a reported issue, or running daily threat briefings, this tool turns the full CVE catalog into something you can query conversationally.

What you can do

  • search_vulnerabilities — find CVEs by keyword: software name, library, version, or vulnerability type like "remote code execution"
  • cve_details — get the full record for a specific CVE ID, including CVSS vector, affected software, CWE type, and reference links
  • recent_vulnerabilities — pull CVEs published in the last N days (default 7), ideal for daily threat monitoring

Who it's for

Security researchers investigating specific software or dependencies. DevSecOps engineers auditing packages in a build pipeline. IT teams responding to disclosed vulnerabilities in their stack. Developers checking whether a library they use has known issues before shipping.

How to use it

  1. Use search_vulnerabilities with a software name or version to find relevant CVEs
  2. Use cve_details with a specific CVE ID (e.g. CVE-2021-44228) to get the full technical record
  3. Use recent_vulnerabilities with days set to 1 for a daily briefing of new advisories
  4. Filter results by severity — focus on CRITICAL and HIGH for most auditing tasks

Getting started

All three skills are ready to use without any setup. Start with search_vulnerabilities and the name of the software or library you want to audit.

Search Vulnerabilities

Search the vulnerability database by keyword. Find CVEs related to specific software, libraries, or vulnerability types. Returns severity scores, descriptions, and links.

Returns: List of CVEs with IDs, descriptions, severity scores, and detail links
CVE Details

Get full details for a specific CVE by its ID. Returns description, CVSS score, severity, weakness types, references, and affected configurations.

Returns: Full CVE details including description, severity, CVSS vector, CWEs, and references
Recent Vulnerabilities

Get recently published vulnerabilities. Filter by time period to stay current on new security advisories and emerging threats.

Returns: Recently published CVEs with severity scores and descriptions
Loading reviews...

Loading activity...

v0.022026-03-22
  • Added subtitle, expanded description, and agent instructions
v0.012026-03-20
  • Initial release

Vulnerability Database Use Cases(6)

Browse all 6 Vulnerability Databaseguides →
Open Research Vulnerabilities by Software

Research Vulnerabilities by Software

Search for known vulnerabilities affecting specific software products, libraries, or frameworks in your stack.

Vulnerability Database icon
Vulnerability Database
4 agent guides
Open Check CVE Details

Check CVE Details

Look up detailed information about specific CVEs including severity, affected versions, exploit availability, and patches.

Vulnerability Database icon
Vulnerability Database
4 agent guides
Open Screen Entities Against Sanctions Lists

Screen Entities Against Sanctions Lists

Check individuals and companies against OFAC, UN, EU, and other global sanctions lists before onboarding or transacting.

Compliance Screening icon
Compliance Screening
4 agent guides
See every Vulnerability Databaseuse case (Claude, ChatGPT, Copilot, OpenClaw guides) →

Related Tools

Related Categories

Frequently Asked Questions

Can I search by CVE ID or product name?

Yes. The database supports keyword search and direct CVE lookups.

What details come with a CVE?

You get CVSS severity, affected software, CWE type, and reference links.

Can it help with dependency or exposure monitoring?

Yes. It is a good fit for security research, dependency auditing, and DevSecOps workflows.

Does it include recent advisories?

Yes. Recent advisories are part of the search surface.