CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Explore CVEs

Browse vulnerabilities by how they're exploited, or dive into the most affected vendors.

By Attack Vector

Network

Exploitable remotely over the internet with no physical access required. The most dangerous and common attack vector.

Browse CVEs

Adjacent Network

Requires access to the same local network, Bluetooth, or subnet as the target system.

Browse CVEs

Local

Requires local system access — the attacker must be logged in or have physical presence.

Browse CVEs

Physical

Requires direct physical interaction with the target device to exploit the vulnerability.

Browse CVEs