The Vulnerability Intelligence Hub is a lightweight, client-side analytical tool designed to provide comprehensive security intelligence without the need for costly subscriptions or proprietary databases. By leveraging a decentralized architecture, the tool orchestrates real-time data retrieval from a suite of public and official cybersecurity repositories, including the National Vulnerability Database (NVD), CISA's Known Exploited Vulnerabilities (KEV) catalog, the FIRST EPSS model, and the CVE Program.
Tailored for both offensive and defensive security practitioners, the tool centralizes prioritization metrics while providing immediate access to public exploits and proof-of-concept (PoC) code.
No, aside from basic analytics provided by Cloudflare Pages. I don't know who you are or which vulnerabilities you are looking for, and I don't care to know.
Note on Cloudflare Pages: This site uses standard Cloudflare Web Analytics, which is a privacy-first, non-invasive analytics service. It does not use cookies, does not collect personal data, and does not track users across different websites. It only provides high-level metrics like page views and browser types to help me understand site performance.
The SSVC decision is automatically calculated in "paranoid mode." For the purpose of providing immediate, actionable intelligence, the tool assumes the "Mission & Wellbeing Impact" is always High. This ensures that the suggested priority (Track, Attend, Act) leans toward safety and urgency.
I am calculating it dynamically based on the available data from other sources:
• If the CVE is in the CISA KEV catalog, it is set to Active (A).
• Else if there is at least one PoC URL, it is set to PoC (P).
• Otherwise, it defaults to None (N).
The CVE is marked as Yes (Y) if the CVSS metrics match:
Attack Vector: NETWORK + Privileges Required: NONE + User Interaction: NONE + Attack Complexity: LOW.
All other conditions result in No (N).
Marked as Total (T) if Confidentiality Impact: HIGH AND Integrity Impact: HIGH.
Otherwise, it is marked as Partial (P).
Yes and no. It doesn't have an official vector string format (which is a pity), so I created one for this tool. However, it is built using official short keys derived from the CISA Coordinator framework.
I understand. Everything is open source. You can clone the UI from GitHub and host it yourself. You can also clone data sources from these repos:
Sometimes less is more. To avoid noise, the tool prioritizes the official primary metric from the NVD and favors the most recent CVSS version (e.g., CVSS v4.0 or v3.1 over v2.0).
Currently, PoC research is aggregated from the following sources:
• NVD Reference Tags: Specific links tagged as "Exploit" within the official NVD record.
• Exploit-DB: Entries from the OffSec exploit database.
• GitHub: The awesome nomi-sec/PoC-in-GitHub repository.
Absolutely not. These links are provided for research and intelligence purposes only. You should never execute code found in these repositories without first manually auditing the content in a secured, isolated environment.
Technically, this tool has no backend, which means there are no APIs to call. However, a Python library designed to mirror this retrieval logic is planned for release soon. Or maybe not.
Apache 2.0. In short: you can use, modify, and distribute this for personal or commercial purposes. You don't owe me anything, but you must include the original copyright notice and license text. No warranties provided—if it breaks, you own both parts. You can bore youself with the full license here.