Vulnerability Database
A comprehensive vulnerability resource that includes a curated collection of the latest software vulnerabilities publicly available for sec teams.
Comprehensive specifics on the latest vulnerabilities readily accessible for security experts and researchers to examine. These vulnerabilities form part of the widely adopted Recorded Future’s Vulnerability Intelligence Module, leveraged by security teams, Security Operations Centers (SOCs), and cybercrime investigators globally. Our CVE DB information is regularly refreshed, encompassing the latest findings in security research.
Top 9 Trending CVEs
- CVE-2024-3400Published: April 12, 2024 | Severity: CRITICAL
- CVE-2024-23897Published: January 24, 2024 | Severity: CRITICAL
- CVE-2022-30190Published: June 1, 2022 | Severity: HIGH
- CVE-2024-0204Published: January 22, 2024 | Severity: CRITICAL
- CVE-2020-1472Published: August 17, 2020 | Severity: CRITICAL
- CVE-2024-1709Published: February 21, 2024 | Severity: CRITICAL
- CVE-2024-1651Published: February 20, 2024 | Severity: CRITICAL
- CVE-2024-6110Published: June 18, 2024 | Severity: CRITICAL
- CVE-2024-3289Published: May 17, 2024 | Severity: HIGH
Newly Added CVEs
- CVE-2024-8751Published: September 12, 2024 | Severity: HIGH
- CVE-2024-8641Published: September 12, 2024 | Severity: MEDIUM
- CVE-2024-45383Published: September 12, 2024 | Severity: MEDIUM
- CVE-2024-8754Published: September 12, 2024 | Severity: MEDIUM
- CVE-2024-8640Published: September 12, 2024 | Severity: HIGH
- CVE-2024-8635Published: September 12, 2024 | Severity: HIGH
- CVE-2024-8631Published: September 12, 2024 | Severity: MEDIUM
- CVE-2024-6702Published: September 12, 2024 | Severity: MEDIUM
- CVE-2024-6701Published: September 12, 2024 | Severity: MEDIUM
- CVE-2024-6700Published: September 12, 2024 | Severity: MEDIUM
Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future
Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
- Gain complete coverage of your cyber, third party, and physical attack surface
- Proactively mitigate threats before they turn into costly attacks
- Make fast, effective, data-driven decisions