Software Search
The Software Search page allows you to find applications and vendors with known security vulnerabilities (CVEs) and add them to monitoring.
This is typically the starting point when onboarding or expanding your monitoring scope.
Tip
Start with a vendor name if you’re unsure of the exact product—this helps ensure complete coverage.
Page Overview
When to use this page
- When onboarding to CVEalert.io for the first time
- When adding new software to your monitoring scope
- When checking whether a specific product has known CVEs
What you can do
- Search for software by vendor name, product name, or partial match
- Discover whether a specific software product has known CVEs
- Compare CVE counts across similar software or vendors
- Quickly determine if software is already under monitoring
- Add one or more software products to monitoring in bulk
At a Glance
- Searchable catalog of software with known CVEs
- CVE counts per software product
- Monitoring status indicators
- Bulk add-to-monitoring actions
Key Sections & UI Elements
Search Controls
This section lets you define how you want to search the catalog.
Search Input
- Placeholder:
Enter a search term (e.g. "atlassian") - Accepts:
- Vendor names (e.g.,
Microsoft) - Software names (e.g.,
Apache) - Partial matches (e.g.,
astro)
- Vendor names (e.g.,
Search Scope Dropdown
- Default option:
Vendor or Software - Controls whether the search term applies to:
- Vendor names
- Software names
- (Other options may appear depending on configuration)
Search Button
- Executes the search using the entered term and selected scope
Results Table
Once a search is performed, matching results appear in a table.
Columns
-
Checkbox
- Select one or more software entries for bulk actions
-
Logo
- Vendor or software logo (if available)
- Generic icon is shown when no logo exists
-
Vendor
- Name of the company or organization maintaining the software
-
Software
- Specific product or package name
-
CVEs
- Number of known CVEs associated with this software
- Higher numbers may indicate greater security risk or longer history
-
Monitoring
- Indicates whether the software is already being monitored
- A checkmark (
✓) means monitoring is active
Results Count
- Displayed above the table (e.g.,
31 results) - Helps confirm how many matches were found
Add Selected to Monitoring
A green Add selected to monitoring button appears:
- Above the table
- Below the table
This allows you to quickly enable monitoring for one or more selected software entries.
Step-by-Step: Searching and Monitoring Software
-
Enter a search term
- Example:
astro - Partial matches are supported
- Example:
-
Confirm the search scope
- Leave as
Vendor or Softwareunless you want to narrow the search
- Leave as
-
Click
Search- Results appear in the table below
-
Review the results
- Check the vendor and software names carefully
- Pay attention to the CVEs column
-
Select software to monitor
- Use the checkbox on the left of each row
-
Click
Add selected to monitoring- Monitoring is enabled for the selected software
- The Monitoring column updates to show a checkmark
Expected outcome:
You will begin receiving alerts when new CVEs are published for the selected software.
Tips, Notes, and Warnings
Tip
Start with broad searches (e.g., vendor name) and narrow down once you identify the exact product you use.
Note
Some vendors publish multiple software packages with similar names. Always verify the Software column before enabling monitoring.
Warning
A high CVE count does not necessarily mean the software is insecure today—it may simply be widely used or have a long history.
Advanced & Power-User Notes
- You can bulk-add multiple software entries at once using the checkboxes.
- Software already under monitoring will show a checkmark and does not need to be re-added.
- Searching by partial terms (e.g.,
astro) may return:- Vendors
- Frameworks
- Plugins or extensions
- Review results carefully to avoid monitoring unintended packages.
Assumptions
- The Monitoring checkmark indicates active alerting is already enabled.
- Search results are limited to software with at least one known CVE.
- Changes take effect immediately after adding software to monitoring.
If your organization uses many products from the same vendor, consider searching by vendor name first to ensure complete coverage.