Vulnerability Database
and Search Engine

Database of software vulnerabilities and exploits in one feed

Enrich your Security Operations with relevant, correlated, and ready-to-use vulnerability data such as exploits, social networks buzz, and experts analysis. Focus your efforts only on threats that matter

Learn More
Vulnerability Security Feed
Security advisories and articles
Software vendors and other security sources
0k +
Exploits for popular software and systems
Average Entries added per day

Get instant access to Database
via flexible API and SDK

Integrate vulnerability detection into your product or create your own vulnerability management product fully customized to your tasks using our ready-to-use API wrapper and Python SDK

curl -XPOST \
  -H 'Content-Type: application/json' \
  -d '{
    "id": "CVE-2017-14174",
    "fields": [
    "apiKey": "{{ YOUR_API_KEY }}"
1Get Full info by CVE ID
2Search in Database
3Get references for the vulnerability
4Search Exploits
5Get vulnerabilities by CPE product & version
Vulners Vulnerability Assessment

vulnerability assessment

Deploy powerful vulnerability assessment service for internal Linux infrastructure, or as a part of MSSP offering without headache and limitations of active scanning. No more accidental down-times

Learn More




Be informed and receive relevant daily vulnerabilities updates

Linux Scanner

Linux Scanner

Use our free scanner to manage vulnerabilities on Linux based machines

Perimeter Scanner

Perimeter Scanner

Control your perimeter automatically with our new hosted vulnerability scanner


Burp Suite plugin

Burp Suite plugin

Passively search vulnerable servers while surfing the net
Splunk plugin

Splunk plugin

Vulnerability assessment platform and security scanner
Nmap  plugin

Nmap plugin

Detect vulnerable servers directly from popular security tool

Trusted by


Become a partner with Vulners

To expand your security business