I built CVEFinder while doing bug bounty and vulnerability research. I kept running into issues with NVD-style CPE matching: slow searches, incorrect product mappings, and difficulty answering simple questions like “which products are affected by this CVE?”
CVEFinder focuses on:
* fast CVE lookup * clearer vendor/product/version mapping * filtering CVEs by real-world products * API access for automation and tooling
It’s still early and incomplete, and I’m actively iterating based on feedback. I’d especially love input from security engineers and researchers on:
* gaps you see in CVE data * pain points with existing CVE databases * what would make this actually useful in daily work
Happy to answer any technical questions.
fork-bomber•1h ago