Open Source Security Alerting Platform



OpenCVE lets you search the CVE you want filtered by vendor, product, CVSS or CWE.
Because security is our main concern as well, everything is done to ease access to vulnerabilty warnings and let you know first.
OpenCVE is synchronized with the feed provided by the NVD. So each CVE displays the standards you already know :
OpenCVE parses the CPEs of each CVE and extract the associated vendors and products.
You can then subscribe as many vendors or products as you want, and you will be notified as soon as a CVE concerning them is published or updated.
Your dashboard only includes the CVE associated to your subscriptions, and you can filter the list by keywords of CVSS score.
OpenCVE keeps track of the changes, so you can find the history of your alerts in your Reports page.
Don't miss a vulnerability disclosure anymore : you subscribe in one click on any vendors or products, and you receive an alert as soon as a CVE is published or updated.
OpenCVE formats the notifications in such a way that you can quickly see what are the affected vendors and products.
OpenCVE has been released on Github, so you can now use it in SaaS mode or On-premise.
You want a new feature ? You discovered a bug ? Create an issue, or even better make a pull-request, the OpenCVE community will be happy to review it.
Join the OpenCVE community and start to get notified about new vulnerabilities.
Many CVE are released every day, but you're not interested by all of them. OpenCVE allows you to filter the list by subscribing to vendors and their products (Microsoft, Cisco, Apple, Wordpress...).
OpenCVE regularly fetch the list of CVE from the NVD and check your subscriptions : if an update concerns you, a notification is automatically sent. You can also choose to group the alerts and send them once a day.
You just receive an alert concerning your vendors and products, it's now time to go into details to check if you're impacted : what are the vulnerable versions, what is the CVSS score, read the references links, etc.