Loading...
CVEs This Year
Loading...
Avg CVEs/Day
Loading...
YOY Growth
Loading...
Loading...
Total CVEs
Loading...
Ransomware CVEs
Known campaign use
Loading...
CISA KEV
Official KEV catalog
Loading...
VulnCheck KEV
Extended KEV data
Loading...
Total Unique KEV
Combined KEV sources
Loading...
MITRE Techniques
ATT&CK framework
Loading...
Threat Actors
APT groups tracked
Loading...
Zero-Days
ITW + ZDI tracked
Loading...
GitHub PoCs
Public exploit code
Loading...
Nuclei Templates
Automated scanners
Loading...
Public Exploits
ExploitDB + Metasploit
Loading...
Bug Bounty CVEs
BB program tracked
Loading...
References
Advisory links indexed
Loading...
NVD CWE
Official CWE (non-empty)
Loading...
AI-ML CWE
ML model CWE predictions
Loading...
AI-LLM CWE
LLM CWE predictions
Loading...
➕ AI-ML Enriched
NVD empty, ML added CWE
Loading...
➕ AI-LLM Enriched
NVD empty, LLM added
Loading...
≠ AI-LLM Different CWE
LLM CWE differs from NVD
Loading...
AI-ML Threat Type
ML attack outcomes
Loading...
AI-ML Threat Impact
ML vulnerability types
Loading...
AI-LLM Threat Type
LLM attack outcomes
Loading...
AI-LLM Threat Impact
LLM vulnerability types

CVE Search

Search the vulnerability database with AI-powered intelligence

PS-HP High Profile Vulnerabilities iPhoenix High-Profile Score (PS-HP): CVEs with confirmed exploitation evidence from KEV, ransomware campaigns, or verified exploits. Calculated using Evidence, Likelihood, Severity, Blast Radius, Popularity, and Bug Bounty signals.

CVE Score Sev Tech
Loading...

Hot iRecent Hot CVEs: Vulnerabilities from the last 90 days with strong exploitation signals including KEV listing, ransomware association, high EPSS scores, or verified exploit code.

CVE PS-HP Score Signals
Loading...

News iHot in News: CVEs receiving significant community and media attention based on GitHub PoC stars/forks, social media mentions, Reddit discussions, and security news coverage.

CVE Activity Source
Loading...

PS-EW Enterprise Watch iPhoenix Enterprise Watchlist (PS-EW): Critical enterprise CVEs (CVSS 9.0+) that lack exploitation evidence. Monitor these for emerging threats - they affect enterprise software but haven't been weaponized yet.

CVE CVSS Category
Loading...

CVE Publications by Year

Historical trend of vulnerability disclosures from 1999 to present
Per Year Cumulative
Total Refs
CVEs
Avg/CVE
Domains

Phoenix Security Vulnerability Weekly

EXPERT ANALYSIS
Latest Vulnerability Analysis Articles

AI Threat Types

AI-LLM & AI-ML classified attack outcomes (All Time)

AI Threat Impacts

AI-LLM & AI-ML classified vulnerability types (All Time)

Exploit Intelligence

Nuclei templates, GitHub PoCs, and Public Exploits by year
Unique KEV
Combined sources
GitHub PoCs
Public exploits
Nuclei
Templates
Public Exploits
ExploitDB + Metasploit

Bug Bounty Intelligence

CVE tracking across bug bounty programs over time
Total CVEs
Unique tracked
Critical
KEV or High EPSS
In KEV
Actively Exploited
New This Year
vs Last Year
Snapshots
Data sources
BB CVEs per Year
Critical CVEs per Year
KEV CVEs per Year

🏢 CNA

CVE Numbering Authority activity and organizational analysis

CPE

Common Platform Enumeration and affected technology analysis

CWE

Common Weakness Enumeration patterns and vulnerability types

Scoring & Risk

CVE volume compared to Known Exploited Vulnerabilities (KEV) by year
Loading...
High Risk CVEs
EPSS > 0.5
Loading...
Elevated Risk
EPSS > 0.1
Loading...
EPSS Coverage
CVEs scored
Loading...
KEV Recent
Last 30 days

Growth

Year-over-year CVE publication trends and growth analysis

Calendar

Daily and monthly CVE publication patterns

Vulnerabilities by Type & Year

Historical trends of AI-classified threat types across all CVEs (2016-Present)

AI Threat Types

AI-classified attack outcomes
All Time
2025
2026
AI-generated

AI Threat Impacts

AI-classified vulnerability types
All Time
2025
2026
AI-generated

About Phoenix CVE Intelligence

Full About Page
Threat-Centric Vulnerability Intelligence

Phoenix CVE Intelligence is powered by Phoenix Security's threat-centric approach, transforming overwhelming vulnerability data into clear, actionable intelligence. No cost, open source vulnerability platform for security professionals.

Coverage Statistics
  • 287,800+ CVE entries across 28 years (1999-2026)
  •  284,181 CVSS scored vulnerabilities
  •  1,463 known exploited CVEs in the CISA KEV catalog
  • 206,053 CWE classified weaknesses
  • 290 active CNAs with attribution data
Platform Features
  • Real-Time Analytics: 6-hour automated updates
  • Intelligence Dashboards: CNA, CVSS, CWE, Growth
  • Open Source: Free access for everyone
  • Modern Tech: Python, Chart.js, D3.js