This product is not supported for your selected Datadog site. ().

The CVE Explorer gives you a searchable catalog of every CVE and security advisory tracked by Datadog, including detailed information about affected packages, exploit availability, and fix guidance. Unlike the Vulnerabilities explorer, which shows findings scoped to your repositories and services, CVE Explorer shows the full set of CVEs Datadog tracks, so you can proactively assess exposure to newly published vulnerabilities before they appear in your findings.

For CVEs that affect packages detected in your scanned repositories and services, Datadog automatically marks them as impacted. Assets that have not been scanned do not show an impacted status.

To access the CVE Explorer, navigate to Detection Coverage > CVE Explorer.

CVE Explorer showing a list of critical advisories filtered by impacted and Maven ecosystem

Search and filter CVEs

Use the search bar to find a specific CVE or advisory ID (for example, CVE-2025-24813 or a GHSA identifier), or search by package name to see all advisories affecting a specific library. You can filter the list by:

FilterDescription
SeverityBase severity score: critical, high, medium, low
ImpactedIndicates whether any asset in your environment is affected
Exploit AvailableIndicates whether a public exploit has been published
CISA Known ExploitIndicates whether the CVE appears in the CISA KEV catalog
EPSS ScoreExploit Prediction Scoring System probability
EcosystemPackage ecosystem: Maven, npm, PyPI, Go, and others

The Impacted filter is the fastest way to focus on CVEs that affect libraries detected in your repositories or running services.

CVE details panel

Clicking any CVE opens a details panel showing the severity score, publication date, and a summary of impacted repositories, services, and infrastructure resources.

CVE details panel header showing impacted repositories, services, and infrastructure resources

Summary

A description of the vulnerability sourced from the NVD and the advisory database, including affected versions and conditions required for exploitation.

CVE summary section showing vulnerability description and affected versions

Risk signals

Datadog surfaces additional risk context alongside the base severity score:

  • Exploit Available: Indicates a public exploit exists for this vulnerability, with the date it became available.
  • CISA Known Exploit: Flags CVEs listed in the CISA Known Exploited Vulnerabilities catalog, with the date added.
  • High Exploitation Risk (EPSS): Shows the EPSS probability score, which estimates the likelihood of exploitation in the wild within the next 30 days.
Risk signals showing Exploit Available and EPSS score for a CVE

Impacted packages

Lists every package affected by the CVE, including:

  • Package name and a link to the library in your Library Inventory if detected in your environment
  • Ecosystem (Maven, npm, PyPI, and so on)
  • Impacted versions: All versions known to be vulnerable
  • Fixed versions: The earliest versions where the vulnerability is resolved

Use this table to identify which version to upgrade to for remediation.

Impacted packages table showing package names, ecosystems, impacted versions, and fixed versions

External references associated with the CVE, including NVD advisories, GitHub Security Advisories, proof-of-concept repositories, and patch commits. Reference types include:

  • Advisory: Official advisory from NVD or a package registry
  • Web: External links such as patch commits, blog posts, or PoC repositories
Reference links table showing advisory and web links for a CVE

Further reading

Additional helpful documentation, links, and articles: