The SOC Defenders CVE database gives you a searchable view of vulnerabilities sourced from the National Vulnerability Database (NVD), enriched with two critical prioritization signals: CISA Known Exploited Vulnerabilities (KEV) status and EPSS exploit probability scores. Together these signals help you focus patching and detection effort on vulnerabilities that pose real, active risk — not just theoretical severity.Documentation Index
Fetch the complete documentation index at: https://docs.socdefenders.ai/llms.txt
Use this file to discover all available pages before exploring further.
What the database contains
Every CVE entry includes:- CVE identifier and description from NVD
- CVSS base score and severity rating (Critical, High, Medium, Low)
- CISA KEV flag — whether the vulnerability is confirmed as actively exploited in the wild
- EPSS score — the probability that the vulnerability will be exploited in the next 30 days
- Published date
Searching by CVE ID
Type a CVE identifier (e.g.,CVE-2024-12345) into the CVE Search box at the top of the database page. The list filters to matching entries as you type.
Severity filtering
Use the severity buttons to restrict the list to vulnerabilities in a given CVSS band:| Severity | CVSS range |
|---|---|
| Critical | 9.0–10.0 |
| High | 7.0–8.9 |
| Medium | 4.0–6.9 |
| Low | 0.1–3.9 |
CISA KEV filter
Enable CISA KEV Only to show only vulnerabilities that CISA has confirmed are being actively exploited in the wild. The KEV catalog is maintained by CISA and represents the highest-priority vulnerabilities for remediation — federal agencies are required to patch them within set deadlines, and the catalog is a reliable signal for any organization’s patching queue.Sort options
Sort the database using any of three columns:- Published Date — most recently disclosed CVEs first
- CVSS Score — highest severity first
- EPSS Score — highest exploitation probability first