To access material, start machines and answer questions login.
Vulnerability databases are centralised repositories that collect, organise, and publish information about known security vulnerabilities. Instead of every security team discovering the same issues repeatedly, vulnerability databases provide a shared source of truth for the cyber security community.
These databases document:
- What the vulnerability is
- Which products or versions are affected
- How severe the issue might be
- Where to find more technical details or fixes
Vulnerability databases are used by security analysts, system administrators, penetration testers, and automated security tools to understand existing threats and make informed security decisions.
Without vulnerability databases:
- Vulnerabilities would be named inconsistently
- Patch tracking would be difficult
- Security tools would lack reliable reference data
By standardising vulnerability information, these databases enable efficient vulnerability management, risk assessment, and remediation planning across organisations.
Learning Objectives
By completing this room, you will:
- Understand what vulnerability databases are
- Learn why vulnerability databases are important
- Recognise common vulnerability database terminology
- Explore different vulnerability databases through hands-on tasks
Prerequisites
Before starting this room, it is recommended that you are familiar with:
I understand the learning objectives and am ready to learn about vulnerability databases!
Before vulnerability databases existed, security teams often worked in isolation. The same vulnerability could be researched multiple times by different people, described using other names, and patched without clear visibility. This made it easy for critical security issues to be missed or misunderstood.
Vulnerability databases address these challenges by providing a centralised and standardised source of information. They help security professionals:
- Avoid duplicate research by referencing known issues
- Use consistent naming for vulnerabilities across tools and teams
- Stay aware of available patches and security advisories

Vulnerability databases also help connect the full security lifecycle. A vulnerability describes a weakness in software or configuration, an exploit demonstrates how that weakness can be abused, and a patch or mitigation provides a way to fix it. Databases act as the link that ties all of this information together.
In real-world security operations, vulnerability databases are essential for vulnerability management and patching. They allow teams to track affected systems, prioritise fixes, and reduce risk in a structured and efficient way.
Do vulnerability databases connect vulnerabilities, their associated exploits, and available patches? (yea/nay)?
Vulnerability databases use standardised building blocks to describe security issues in a consistent and actionable way. These building blocks ensure that vulnerabilities can be accurately identified, assessed, and referenced across different tools and databases.

Vulnerability Identifier ()
A vulnerability identifier uniquely identifies a known security flaw so it can be tracked consistently across tools and databases. The most widely used identifier is the Common Vulnerabilities and Exposures () system (opens in new tab), which assigns a unique ID to each vulnerability. For example, CVE-2021-44228 refers to the Log4Shell vulnerability, allowing scanners, databases, and reports to reference the same issue unambiguously.
Severity Representation (CVSS)
Severity in vulnerability databases is represented using the Common Vulnerability Scoring System (CVSS) (opens in new tab). CVSS assigns a numerical score that reflects how easily a vulnerability can be exploited and the potential impact if it is successfully abused. For example, a vulnerability with a CVSS score of 9.8 is considered critical and generally requires immediate attention. You can learn more about ratings in the Vulnerabilities 101 room.
Affected Product Identification (CPE)
Vulnerability databases identify affected software using Common Platform Enumeration (CPE) (opens in new tab), which provides a standardised naming format for vendors, products, and versions to clearly define what is vulnerable. For example, instead of stating “Apache is affected,” a CPE entry specifies the exact version that contains the vulnerability.
Common Weakness Enumeration (CWE)
Vulnerability databases also classify the underlying weakness that caused a security issue using Common Weakness Enumeration (CWE), which groups vulnerabilities by root cause, helping security professionals understand why a flaw exists, not just what is affected. For example, a vulnerability mapped to CWE-94 (Improper Control of Generation of Code) indicates a code-injection weakness, even if it appears across different products.
Numbering Authorities (CNA)
Numbering Authorities (CNAs) (opens in new tab) are organisations authorised to assign identifiers to newly discovered vulnerabilities. CNAs help scale the program by allowing vendors and organisations to report vulnerabilities in their own products directly. For example, Microsoft, as a CNA, assigns to vulnerabilities affecting Windows or Microsoft services, ensuring these issues are consistently tracked across the List and other vulnerability databases.
Vulnerability Metadata
In addition to identifiers and severity scores, vulnerability entries include metadata such as a technical description, reference links, and remediation information. This data helps users understand the vulnerability and locate trusted guidance. For example, a entry may include links to vendor advisories or security research explaining how to patch the issue.
Severity vs Risk
Severity describes the technical impact of a vulnerability, while risk considers how that vulnerability affects a specific environment. Risk depends on factors such as system exposure, usage, and business importance. Example: A high-severity vulnerability on an isolated test system presents lower risk than a medium-severity vulnerability on an internet-facing production server.
What classification system groups vulnerabilities based on their root cause?
Which standardised naming scheme is used to identify affected vendors, products, and versions precisely?
The List is a public catalogue of known security vulnerabilities that provides a unique identifier for each issue. Its primary purpose is to ensure that every vulnerability can be consistently referenced across tools, reports, and databases.
The List is maintained by (opens in new tab), which coordinates with vendors and security researchers to assign identifiers. does not analyse severity or provide remediation guidance; its role is limited to tracking and standardising vulnerability names.
Each entry provides a standardised identifier, a brief description of the vulnerability, and information about affected vendors or products, allowing security professionals to recognise and reference an issue quickly. The List may also include severity scores and version details when provided by the assigning authority.
Practical
Open your browser and navigate to the official website at https://www..org (opens in new tab). Use the search bar to look up CVE-2026-22869, which will display the vulnerability details as shown below:

Once you search for the , you will get the following results:

- The top of the page displays the
PublishedandUpdateddates, both listed as2026-01-13, showing when the vulnerability was first disclosed and last modified. - The
TitleandDescriptionsection shows that the vulnerability allows arbitrary code execution inEigentthrough a GitHub Actions CI workflow using thepull_request_targettrigger. - The CWE for this CVE is
CWE-94, which shows that the vulnerability is caused by improper control of code generation, leading to a code injection issue. - Locate the CVSS section and review the severity information. Observe the
CVSS v4.0score of8.9(High), indicating that the vulnerability can be exploited remotely without authentication or user interaction. - This section shows the exact products affected by the vulnerability; in this case, the vendor is eigent-ai, the product is eigent, and all versions prior to commit
bf02500bbbab0f01cd0ed8e6dc21fe5683d6bfb5are affected.
The List provides structured information, including vulnerability descriptions, severity scores, weakness classifications, and affected products. However, it may not always include exploitation details, proof-of-concept, or mitigation steps, which require further research from external sources.
What is the CVSS score for the vulnerability?
What is the CWE number for the CVE-2026-22871?
What is the vendor name for the CVE-2026-22871?
The National Vulnerability Database (NVD) is a public vulnerability database maintained by the National Institute of Standards and Technology (). It builds upon the List by enriching entries with additional analysis, scoring, and structured data.
While the List focuses on uniquely identifying vulnerabilities, the NVD provides context and assessment, making it more useful for risk analysis and vulnerability management workflows. The NVD enhances records by adding severity scoring, CPE-based affected product mappings, and impact metrics. This allows security teams to better understand the vulnerability's severity and which specific systems may be affected.
Unlike the List, the NVD performs its own analysis and standardisation, ensuring consistency across severity scores and product data. As a result, many security tools rely on the NVD as a primary data source for vulnerability prioritisation.
Practical
Open your browser and navigate to the NVD vulnerability search (opens in new tab)page as shown below:

Use the search bar to look up CVE-2025-67501 and open the vulnerability record from the results list.


Once the detail page loads, observe the following sections:
- Description: The description explains that WeGIA, an open-source web manager, contains an SQL injection vulnerability in the
/html/matPat/editar_categoria.phpendpoint due to improper input validation of theid_categoriaparameter. It also clearly states that the issue is fixed in version 3.5.5. - Metrics: Scroll to the metrics section and note that NVD has not yet provided its own CVSS score, while the CNA (GitHub, Inc.) assigns a CVSS v4.0 score of
9.4(Critical). This highlights how NVD displays multiple severity sources when available. - References: Scroll to the References section and observe the listed external links. One of the references is tagged as
Exploit, which links to a GitHub Security Advisory. This advisory provides technical details and proof-of-concept information demonstrating how the SQL injection vulnerability can be exploited. - Weakness Enumeration: Locate the CWE section, which maps this vulnerability to
CWE-89, confirming that the root cause is injection. - Known Affected Software Configurations: Review the affected software list, which uses CPE identifiers to show that WeGIA versions up to (but not including) 3.5.5 are vulnerable.
Most of the time, the List (on .org (opens in new tab)) and the NVD detail page show the same description, product info, and links; it’s because the NVD has already enriched that with all available data. While both .org and the NVD reference the same identifiers, the NVD is generally more comprehensive.
The NVD enriches records with detailed severity scoring and vector breakdowns, clearly tagged references such as patches or exploits, and structured CPE and CWE mappings. This additional context makes the NVD more useful for , prioritisation, and risk-based decision-making than the List alone.
Which vulnerability database enriches CVE entries with structured CPE mappings and tagged exploit references?
Using the NVD, what is the CVSS v3.1 base score assigned to CVE-2021-44228?
In addition to the List and the NVD, several other public vulnerability databases exist, each designed to serve a specific purpose during pentesting or securing a system.
Exploit-focused databases, such as ExploitDB, concentrate on proof-of-concept exploits and real-world attack techniques. Penetration testers and red teamers commonly use these databases to understand how vulnerabilities can be practically exploited.
Vendor security advisories are published directly by software vendors and provide authoritative information about vulnerabilities in their products. These advisories often include patch availability, mitigation steps, and recommended upgrade paths, making them valuable for defenders and system administrators.
Community-driven and regional databases collect vulnerability information from open-source contributors, researchers, or region-specific CERTs. These databases may surface issues earlier than official sources or provide additional context not found elsewhere.
Each of these databases serves a different role; some focus on exploitation, others on remediation, and others on early disclosure or regional awareness. Together, they complement the List and NVD rather than replacing them.
Practical
Open your browser and navigate to the Exploit Database search (opens in new tab)page:

Use the search bar to look up CVE-2025-10327. You can also search using other filters, such as exploit title, platform, author, or content, if a ID is not available.

Once the results load, note that ExploitDB lists a matching exploit entry. Click on the exploit to view its full details.
On the exploit detail page, review the following information:

- Exploit overview: The page shows the exploit title “RPi-Jukebox-RFID 2.8.0 - Remote Command Execution”, along with a unique EDB-ID (52468) and the associated
CVE-2025-10327. - Exploit Metadata: Note the author name, exploit type (
WEBAPPS), platform (MULTIPLE), and the publication date. This metadata helps identify the exploit’s origin and intended target environment. - Exploit Authenticity: The small down arrow next to
Exploitindicates whether a downloadable PoC is available for the exploit. TheEDB Verifiedlabel indicates whether the exploit has been tested and verified by ExploitDB. Additionally, theVulnerable Appfield is useful for quickly setting up a , as it points to the affected application or version needed to test the exploit. - Proof-of-Concept Code: Scroll down to view the Python-based exploit code, which demonstrates how an attacker can inject a malicious payload into the playlist parameter to execute arbitrary system commands on the target system.
Unlike the List and NVD, which focus on identification and assessment, ExploitDB provides hands-on exploitation details and proof-of-concept code. This makes exploit-focused databases particularly valuable for understanding how vulnerabilities are abused in real-world attacks.
What is the EDB-ID associated with CVE-2025-59342?
What is the author's name for the exploit with CVE-2025-59342?
Vulnerability databases play a critical role in cyber security by providing a structured and standardised way to identify and exploit vulnerabilities in a system.
In this room, we explored why these databases matter, the key building blocks they use, and how different databases, such as the List, NVD, and ExploitDB, serve different purposes. Through hands-on tasks, we learned how to search for vulnerabilities, interpret severity scores, identify affected products, and locate exploit information. Together, these skills help security professionals, especially a pentester, assess risk more effectively and make informed security decisions.
We hope you enjoyed learning and sharpening your skills throughout this room!
I have successfully completed the room!
Ready to learn Cyber Security?
TryHackMe provides free online cyber security training to secure jobs & upskill through a fun, interactive learning environment.
Already have an account? Log in