Search known CVEs by product or keyword using the CIRCL vulnerability feed.
CVE Lookup queries the CIRCL CVE database for vulnerabilities matching a product name or keyword, returning identifiers, severity and summaries so you can connect a fingerprinted technology to its known weaknesses.
It closes the loop between recon and exploitation: detect a version, then find what is publicly known to affect it.
Not necessarily — patches, backports and configuration can mitigate a CVE. Use the result as a lead to verify against the actual target.