Query CVE details, CVSS scores, exploit availability, affected products, and related threat actor activity — all via a single API. Updated daily.
API Coverage
Developer-first
Single REST API key. JSON everywhere. Start for free with 30 req/min.
Get your free key →Latest Intelligence
Two critical zero-day vulnerabilities in Ivanti Connect Secure are being chained to achieve pre-authentication remote code execution, with CISA issuing emergency directives.
ProxyShell is a critical vulnerability chain (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) enabling unauthenticated remote code execution on Microsoft Exchange servers. Since August 2021, ransomware groups including LockFile and Conti have actively exploited unpatched systems.
Multiple critical container escape vulnerabilities affecting Kubernetes, CRI-O, and cloud platforms enable attackers to break out of containers, gain root access, and compromise entire clusters. Recent incidents include CVE-2022-0811, AWS Log4Shell patch flaws, and cross-account takeovers.
CVE-2021-44228 (Log4Shell), a CVSS 10.0 remote code execution flaw in Apache Log4j discovered December 9, 2021, achieved rapid widespread exploitation across 48%+ of corporate networks globally, spawning follow-up vulnerabilities CVE-2021-45046 and CVE-2021-45105, with continued exploitation by state-sponsored and criminal actors through 2022.
Explore other topics