Free CVE Vulnerability Scanner Database

Check if your systems are vulnerable to the most critical, actively-exploited CVEs. Each scanner cross-references NIST NVD data. Free, minutes, no signup.

35+
CVE Scanners
CVSS 9+
Critical Only
Fast
Results Time

🔴 2026 Critical CVEs — Actively Exploited RIGHT NOW

CVE-2026-21858 · CVSS 10.0
n8n Ni8mare — Unauthenticated RCE
CVSS 10.0 unauthenticated RCE in n8n workflow automation. 24,700+ instances exposed. PoC available.
Check Vulnerability →
CVE-2026-24858 · CVSS 9.6
Fortinet Auth Bypass — FortiOS/FortiWeb
Critical auth bypass across FortiOS, FortiManager, FortiAnalyzer, FortiProxy, FortiWeb. Actively exploited.
Check Vulnerability →
CVE-2026-1731 · CVSS 9.8
BeyondTrust RCE — WebSocket Command Injection
Unauthenticated OS command execution via WebSocket. Full system compromise of Remote Support servers.
Check Vulnerability →
CVE-2026-1603 · CVSS 9.8
Ivanti EPM Auth Bypass
Authentication bypass in Ivanti Endpoint Manager. Leaks stored credentials. CISA KEV March 2026.
Check Vulnerability →
CVE-2026-0501 · CVSS 9.9
SAP S/4HANA SQL Injection
CVSS 9.9 SQL injection in SAP S/4HANA Financials General Ledger. Critical enterprise risk.
Check Vulnerability →
CVE-2026-2441 · CVSS 8.8
Chrome CSS Use-After-Free Zero-Day
First actively exploited Chrome zero-day of 2026. RCE via malicious webpage.
Check Vulnerability →
CVE-2026-22719 · CVSS 9.1
VMware Aria Operations Command Injection
Command injection in Broadcom VMware Aria Operations. CISA KEV March 2026.
Check Vulnerability →
CVE-2026-21643 · CVSS 9.3
FortiClientEMS SQL Injection RCE
SQL injection enabling unauthenticated code execution on Fortinet endpoint management server.
Check Vulnerability →
CVE-2026-27825 · CVSS 9.8
MCP Atlassian RCE + SSRF
Critical RCE and SSRF in mcp-atlassian MCP server. Used by Iran-affiliated threat actors.
Check Vulnerability →

🟠 2025 Critical CVEs — Still Being Actively Exploited

CVE-2025-68613 · CVSS 9.8
n8n Expression Injection RCE
Expression injection in n8n workflow automation. 24,700+ exposed instances. CISA KEV March 2026.
Check Vulnerability →
CVE-2025-26399 · CVSS 9.8
SolarWinds Web Help Desk RCE
Deserialization of untrusted data in AjaxProxy. Remote command execution as SYSTEM.
Check Vulnerability →

🟡 2024 Critical CVEs — Still Widely Unpatched

CVE-2024-6387 · CVSS 8.1
regreSSHion — OpenSSH RCE
Race condition enabling unauthenticated RCE. Millions of glibc Linux systems affected.
Check Vulnerability →
CVE-2024-3400 · CVSS 10.0
PAN-OS GlobalProtect RCE
Unauthenticated root RCE in Palo Alto Networks firewall. Exploited as zero-day.
Check Vulnerability →
CVE-2024-1709 · CVSS 10.0
ConnectWise ScreenConnect RCE
Authentication bypass + path traversal. Ransomware actors actively exploiting.
Check Vulnerability →
CVE-2024-21762 · CVSS 9.6
FortiOS SSL-VPN RCE
Out-of-bounds write enabling unauthenticated root code execution in Fortinet SSL VPN.
Check Vulnerability →

⚪ 2023 Critical CVEs — Many Systems Still Unpatched

CVE-2023-4966 · CVSS 9.4
Citrix Bleed — NetScaler
Session token leak enabling auth bypass. Used by LockBit ransomware for initial access.
Check Vulnerability →
CVE-2023-44487 · CVSS 7.5
HTTP/2 Rapid Reset DDoS
Record-breaking 398M RPS DDoS attacks. Affects nginx, Apache, IIS, Cloudflare, AWS.
Check Vulnerability →
CVE-2023-22515 · CVSS 10.0
Confluence Broken Auth
Unauthenticated admin account creation in Confluence. Exploited by Chinese APT groups.
Check Vulnerability →
CVE-2023-20198 · CVSS 10.0
Cisco IOS XE Auth Bypass
40,000+ routers compromised within days by exploiting web UI authentication bypass.
Check Vulnerability →
CVE-2023-35078 · CVSS 10.0
Ivanti API Zero-Day
Unauthenticated API access in Ivanti EPMM. Exploited by nation-state threat actors.
Check Vulnerability →
CVE-2023-48788 · CVSS 9.3
Fortinet SQL Injection RCE
SQL injection enabling SYSTEM-level RCE on Fortinet FortiClientEMS server.
Check Vulnerability →

🟡 2021–2022 Critical CVEs — Still Active in the Wild

CVE-2021-44228 · CVSS 10.0
Log4Shell — Apache Log4j
The most critical vulnerability of the decade. JNDI injection in Log4j. Billions of systems affected.
Check Vulnerability →
CVE-2022-22965 · CVSS 9.8
Spring4Shell — Spring Framework
Remote code execution via data binding in Spring MVC. Millions of Java apps at risk.
Check Vulnerability →
CVE-2021-34527 · CVSS 8.8
PrintNightmare — Windows Spooler
Privilege escalation and remote code execution via Windows Print Spooler.
Check Vulnerability →
CVE-2020-1472 · CVSS 10.0
Zerologon — Windows Netlogon
Instant domain compromise via Netlogon cryptographic flaw. Zero authentication required.
Check Vulnerability →
CVE-2019-0708 · CVSS 9.8
BlueKeep — Windows RDP
Wormable pre-auth RCE in Remote Desktop. Windows 7/Server 2008/XP systems at risk.
Check Vulnerability →
CVE-2021-45046 · CVSS 9.0
Log4j2 Bypass
Bypass of the original Log4Shell fix. Affects Log4j 2.15.0 — many missed this update.
Check Vulnerability →

Don't know which CVE to check first?

Run a full vulnerability scan — we check for all 200+ CVEs simultaneously and show you which ones apply to your stack.

Run Full Vulnerability Scan — Free →

What is the CVE Database?

CVE (Common Vulnerabilities and Exposures) is a list of publicly disclosed security vulnerabilities maintained by MITRE Corporation and funded by the U.S. Department of Homeland Security. Each CVE entry contains a unique identifier, description, and references to patches or advisories.

NIST's National Vulnerability Database (NVD) enriches each CVE with CVSS scores, weakness classifications (CWE), and configuration data (CPE). A CVSS score of 9.0+ indicates a Critical vulnerability that typically allows unauthenticated remote code execution.

VulnScan's CVE scanners are built specifically for external attack surface scanning — checking for CVE exposure from an attacker's perspective, without requiring internal network access or agent installation.

FAQ — CVE Scanner

How does VulnScan's CVE scanner work?

We perform passive, external fingerprinting of your server's technology stack, version numbers, and behavior — then cross-reference against the NIST NVD database. If your exposed software matches a vulnerable version, we flag it with the corresponding CVE.

Is it safe to scan my website for CVEs?

Yes. VulnScan performs non-intrusive passive scanning only. We never attempt to exploit vulnerabilities or modify your systems. Our scanning is equivalent to what benign crawlers like Shodan and security researchers do every day.

How often are new CVEs added?

NIST publishes dozens of new CVEs daily. VulnScan focuses specifically on CVEs with public exploit code or confirmed in-the-wild exploitation — the ones attackers are actually using right now.

Related Security Scanners

Full Vulnerability Scanner Port Check WordPress Security Scan SSL/TLS Checker SQL Injection Scanner XSS Scanner