Getting Started with VulnXplorer
VulnXplorer helps you understand the security posture of your device ecosystem. Build a visual graph of your technology stack — devices, operating systems, applications, and plugins — and the system automatically identifies known vulnerabilities (CVEs) affecting your components.
Quick Start
- Create an account — Sign up for free to get started
- Build your first graph — Go to Assets and click New Graph
- Add components — Search for your devices, OS, and applications by name
- Review vulnerabilities — The system automatically finds CVEs for each component
- Run analysis — Use the Analysis Hub to understand your risk profile
Key Concepts
- Device Graph — A visual representation of your technology stack as a hierarchy: Device → OS → Application → Plugin
- CPE — Common Platform Enumeration, the standard identifier for software products (e.g.,
cpe:2.3:a:apache:http_server:2.4.51) - CVE — Common Vulnerabilities and Exposures, unique identifiers for known security flaws
- CVSS — Common Vulnerability Scoring System, rates severity from 0.0 to 10.0
- KEV — CISA's Known Exploited Vulnerabilities catalog, meaning the vulnerability is actively being used in attacks
- EPSS — Exploit Prediction Scoring System, the probability (0-1) that a CVE will be exploited in the next 30 days