CVE (Common Vulnerabilities and Exposures) — a standardized ID for publicly known vulnerabilities. Format: CVE-YEAR-NUMBER (e.g. CVE-2021-44228 for Log4Shell).
Field Meaning CVE ID Unique identifier Description What the vulnerability is CVSS Score Severity (0–10). Critical: 9.0+, High: 7.0–8.9, Medium: 4.0–6.9, Low: 0.1–3.9 Affected Products CPE identifiers for vulnerable software/hardware References Links to advisories, patches, exploits
Resource URL Best for NVD (NIST)nvd.nist.gov Official CVE details, CVSS scores, CPE matching CVE.org cve.org CVE ID lookup, CNA (assigner) info MITRE CVE cve.mitre.org Original CVE list, legacy lookup CVEDetails cvedetails.com Browse by vendor/product, statistics, charts VulnDB vuldb.com Community-driven, good for quick lookups
Resource URL Best for Exploit-DB exploit-db.com Curated exploit archive, searchable by CVE/product SearchSploit CLI for Exploit-DB (offline) Local exploit search (ships with Kali) GitHub Search for CVE IDs PoC exploits, tools, analysis Packet Storm packetstormsecurity.com Exploits, advisories, tools
Included in Kali. Searches a local mirror of Exploit-DB.
searchsploit CVE-2021-41773
# Copy exploit to current directory
# Show full path to exploit file
Output columns: Title, Path (to the exploit file on disk).
Identify service version — nmap -sV, banner grab, HTTP headers
Search CVE databases — NVD, CVEDetails by product + version
Check for exploits — SearchSploit, Exploit-DB, GitHub CVE-XXXX-XXXXX
Read the advisory — understand the vuln, affected versions, patch status
Find PoC — Exploit-DB, GitHub, Packet Storm
Verify — test in a controlled environment, not production