Help Center

Learn how to use VulnXplorer to secure your device ecosystem.

Getting Started with VulnXplorer

VulnXplorer helps you understand the security posture of your device ecosystem. Build a visual graph of your technology stack — devices, operating systems, applications, and plugins — and the system automatically identifies known vulnerabilities (CVEs) affecting your components.

Quick Start

  1. Create an account — Sign up for free to get started
  2. Build your first graph — Go to Assets and click New Graph
  3. Add components — Search for your devices, OS, and applications by name
  4. Review vulnerabilities — The system automatically finds CVEs for each component
  5. Run analysis — Use the Analysis Hub to understand your risk profile

Key Concepts

  • Device Graph — A visual representation of your technology stack as a hierarchy: Device → OS → Application → Plugin
  • CPE — Common Platform Enumeration, the standard identifier for software products (e.g., cpe:2.3:a:apache:http_server:2.4.51)
  • CVE — Common Vulnerabilities and Exposures, unique identifiers for known security flaws
  • CVSS — Common Vulnerability Scoring System, rates severity from 0.0 to 10.0
  • KEV — CISA's Known Exploited Vulnerabilities catalog, meaning the vulnerability is actively being used in attacks
  • EPSS — Exploit Prediction Scoring System, the probability (0-1) that a CVE will be exploited in the next 30 days