Search

Search the portal with filters for type, exploit pressure, KEV linkage, and patch availability.

Use this as the main operator view when you know part of an identifier, vendor, product, or campaign name but not exactly where it belongs.

Search strategy: start broad with a CVE ID, vendor, product, attack type, or source name, then narrow by signal such as KEV, EPSS, exploited, public PoC, internet-facing, unauthenticated, no-patch, or source confidence.

Fast queries

Good search terms

Try vendor names, product families, CVE IDs, attack tags like RCE or auth bypass, source names like CISA or NVD, and workflow terms like ransomware or appliance.

Examples

Save searches

Repeat investigations

Save filtered searches for recurring reviews such as KEV only, public PoC, no patch, internet-facing, identity, or a high-priority vendor.

Export

Move results into workflow

Use CSV/JSON export for offline review, ticket preparation, or sharing a filtered slice with another analyst.

Type

Signal

Source

Topic

Attack Type

Confidence

Guidance

Enter a term to search the full portal.
Search syntax and examples

Use plain words first. Search supports CVE prefixes, vendor aliases, product names, CPE/CWE fragments when present in the feed, and lightweight typo tolerance for longer terms.