21 Integrated
Intelligence Sources

CVE-iQ aggregates vulnerability intelligence from government databases, open-source repositories, vendor advisories, and specialized threat feeds — providing the most comprehensive CVE coverage available.

230K+
Total CVEs
<5 min
Update Latency
99.9%
Uptime
24/7
Monitoring
api

NIST NVD

Core enriched CVE data with CVSS, CPE, descriptions

Online
View Details
git

MITRE CVE List

Official source of all CVE records

Online
View Details
api

GitHub Advisory

OSS-focused advisories with package info

Online
View Details
api

Google OSV

Aggregated OSS vulns across 30+ ecosystems

Online
View Details
json

CISA KEV

Known Exploited Vulnerabilities catalog

Online
View Details
csv

FIRST EPSS

ML-based exploitation probability scores

Online
View Details
api

Exploit-DB

Public exploits/PoCs linked to CVEs

Online
View Details
api

US-CERT/CISA

US Computer Emergency Readiness Team alerts and advisories

Online
View Details
api

CIRCL CVE

Aggregated CVE search with NVD + other sources

Online
View Details
api

Red Hat Security

Advisories + OVAL for Red Hat/Fedora

Online
View Details
json

Debian Security

Debian-specific CVE/package data

Online
View Details
api

Ubuntu Security

Ubuntu-specific patches and CVE mappings

Online
View Details
git

PyPI Advisory

Python ecosystem advisories

Online
View Details
git

RustSec

Rust crates vulnerabilities

Online
View Details
api

npm Security

JavaScript/Node advisories

Online
View Details
json

Microsoft Security

Windows/Azure/Office advisories in CSAF format

Online
View Details
api

CISA Vuln Notes

Detailed notes on high-impact vulns

Online
View Details
api

OpenCVE

Aggregates MITRE/NVD/RedHat/CISA

Online
View Details
api

Vulnerability-Lookup

Extended lookup with bundles/feeds

Online
View Details
git

Fraunhofer NVD

Cleaned/mirrored NVD JSON feeds

Online
View Details
csv

EPSS Models

Raw EPSS probability data for all CVEs

Online
View Details

Integration Architecture

Core Sources

NIST NVD and MITRE CVE provide the foundation — authoritative CVE data with CVSS scores, CWE classifications, and affected configurations.

Prioritization Data

EPSS scores and CISA KEV catalog enable risk-based prioritization — focus on vulnerabilities most likely to be exploited.

Exploit Intelligence

Exploit-DB, GitHub PoCs, and vendor advisories provide real-world exploit context — know when threats become weaponized.

How Data Flows

Collect

21 sources continuously polled

Normalize

Standardized CVE format

Enrich

EPSS, KEV, exploit data added

Deliver

Real-time API & dashboard

Ready to Access All 21 Sources?

Start your free trial and get instant access to the most comprehensive vulnerability intelligence platform.

Start Free Trial