SploitScan

Modern CVE & Exploit Aggregation Report

{{ "v" }}{{ 0 }}{{ "." }}{{ 14 }}{{ "." }}{{ 2 }}
{% set total = cve_data|length %} {% set ns = namespace(aplus=0, cisa=0, exploits=0, cvss_sum=0.0, cvss_n=0) %} {% for r in cve_data %} {# Priority A+ count #} {% set pr = (r.get('Priority') and r['Priority'].get('Priority')) %} {% if pr == 'A+' %}{% set ns.aplus = ns.aplus + 1 %}{% endif %} {# CISA-listed count (kept for possible future card) #} {% if r.get('CISA Data') and (r['CISA Data'].get('cisa_status') == 'Yes') %}{% set ns.cisa = ns.cisa + 1 %}{% endif %} {# Has public exploits (robust fallback mirrors the table computation) #} {% set expl = r.get('Public Exploits Total') %} {% if expl is none or expl == 0 %} {% set expl = ( (r.get('GitHub Data') and r['GitHub Data'].get('pocs')|length or 0) + (r.get('VulnCheck Data') and (r['VulnCheck Data'].get('data')|sum(attribute='vulncheck_xdb')|length if r['VulnCheck Data'].get('data') else 0) or 0) + (r.get('ExploitDB Data') and r['ExploitDB Data']|length or 0) + (r.get('Metasploit Data') and r['Metasploit Data'].get('modules')|length or 0) + ((r.get('Nuclei Data') and (r['Nuclei Data'].get('file_path') or r['Nuclei Data'].get('raw_url'))) and 1 or 0) ) %} {% endif %} {% if expl > 0 %}{% set ns.exploits = ns.exploits + 1 %}{% endif %} {# Average CVSS #} {% if r.get('CVE Data') and r['CVE Data'].get('cvss_info') %} {% set score = r['CVE Data']['cvss_info'].get('baseScore', 0) %} {% set ns.cvss_sum = ns.cvss_sum + (score|float) %} {% set ns.cvss_n = ns.cvss_n + 1 %} {% endif %} {% endfor %} {% set avg_cvss = ns.cvss_n and (ns.cvss_sum / ns.cvss_n) or 0 %}
Total CVEs
{{ total }}
Priority A+
{{ ns.aplus }}
Has Public Exploits
{{ ns.exploits }}
Avg. CVSS
{{ '%.1f'|format(avg_cvss) }}

Summary

Click headers to sort
{% for r in cve_data %} {% set meta = r['CVE Data'] and r['CVE Data'].get('cveMetadata', {}) or {} %} {% set cve_id = meta.get('cveId', 'N/A') %} {% set pub = meta.get('datePublished', '') %} {% set cvss = (r['CVE Data'] and r['CVE Data'].get('cvss_info') and r['CVE Data']['cvss_info'].get('baseScore')) or 0 %} {% set epss = (r['EPSS Data'] and r['EPSS Data'].get('data') and r['EPSS Data']['data'] and r['EPSS Data']['data'][0].get('epss', 0)) or 0 %} {% set pr = r['Priority'] and r['Priority'].get('Priority') or '' %} {% set pr_class = 'priority-' ~ pr %} {% set cisa = (r['CISA Data'] and r['CISA Data'].get('cisa_status') == 'Yes') %} {% set expl = r['Public Exploits Total'] or ( (r.get('GitHub Data') and r['GitHub Data'].get('pocs')|length or 0) + (r.get('VulnCheck Data') and (r['VulnCheck Data'].get('data')|sum(attribute='vulncheck_xdb')|length if r['VulnCheck Data'].get('data') else 0) or 0) + (r.get('ExploitDB Data') and r['ExploitDB Data']|length or 0) + (r.get('Metasploit Data') and r['Metasploit Data'].get('modules')|length or 0) + ((r.get('Nuclei Data') and (r['Nuclei Data'].get('file_path') or r['Nuclei Data'].get('raw_url'))) and 1 or 0) ) %} {% endfor %}
CVE CVSS EPSS% Priority CISA Expl. Published
{{ cve_id }} {{ cvss and ('%.1f'|format(cvss)) or 'N/A' }} {{ epss and ('%.1f'|format(epss * 100)) or '0.0' }} {{ pr or 'N/A' }} {% if cisa %} Yes {% else %} No {% endif %} {{ expl }} {{ pub and (pub[:10]) or 'N/A' }}
{% for cve in cve_data %} {% set cve_meta = cve['CVE Data'].get('cveMetadata', {}) if cve['CVE Data'] else {} %} {% set containers = cve['CVE Data'].get('containers', {}) if cve['CVE Data'] else {} %} {% set cna = containers.get('cna', {}) %} {% set references = cna.get('references', []) %} {% set descriptions = cna.get('descriptions', []) %} {% set description = descriptions and descriptions[0].get('value') or 'N/A' %} {% set cve_id = cve_meta.get('cveId', 'N/A') %} {% set date_published = cve_meta.get('datePublished', None) %} {% set cvss_info = cve['CVE Data'].get('cvss_info') if cve['CVE Data'] else None %} {% set base_score = (cvss_info and cvss_info.get('baseScore')) or 'N/A' %} {% set base_severity = (cvss_info and cvss_info.get('baseSeverity')) or 'N/A' %} {% set vector_string = (cvss_info and cvss_info.get('vectorString')) or 'N/A' %} {% set epss_val = (cve['EPSS Data'] and cve['EPSS Data'].get('data') and cve['EPSS Data']['data'] and cve['EPSS Data']['data'][0].get('epss', 0)) or 0 %} {% set pr = cve['Priority'] and cve['Priority'].get('Priority') or '' %} {% set pr_class = pr and ('priority-' ~ pr) or '' %} {% set cisa_listed = (cve['CISA Data'] and cve['CISA Data'].get('cisa_status') == 'Yes') %} {% set github_count = (cve['GitHub Data'] and cve['GitHub Data'].get('pocs')|length) or 0 %} {% set vulncheck_count = 0 %} {% if cve['VulnCheck Data'] and cve['VulnCheck Data'].get('data') %} {% for item in cve['VulnCheck Data']['data'] %} {% set vulncheck_count = vulncheck_count + (item.get('vulncheck_xdb')|length) %} {% endfor %} {% endif %} {% set edb_count = cve['ExploitDB Data'] and cve['ExploitDB Data']|length or 0 %} {% set msf_count = (cve['Metasploit Data'] and cve['Metasploit Data'].get('modules')|length) or 0 %} {% set nuclei_link = None %} {% if cve['Nuclei Data'] %} {% if cve['Nuclei Data'].get('raw_url') %} {% set nuclei_link = cve['Nuclei Data']['raw_url'] %} {% elif cve['Nuclei Data'].get('file_path') %} {% set nuclei_link = 'https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/main/' ~ cve['Nuclei Data']['file_path'] %} {% endif %} {% endif %}

{{ cve_id }}

{% if pr %} {{ pr }} {% endif %} {% if cisa_listed %} CISA KEV {% endif %} {% if (github_count + vulncheck_count + edb_count + msf_count + (nuclei_link and 1 or 0)) > 0 %} Has Exploits {% endif %} {% if cve['Risk Assessment'] %} AI {% endif %}
Back to top
Published
{{ date_published and (date_published[:10]) or 'N/A' }}
CVSS: {{ base_score }} ({{ base_severity }}) Vector: {{ vector_string }} EPSS: {{ epss_val and ('%.2f'|format(epss_val * 100)) or '0.00' }}%
Description

{{ description }}

Patching Priority
{% if pr %} {{ pr }} {% else %} N/A {% endif %}

{% if pr == 'A+' %} Elevated risk due to CISA listing or public exploits present. {% elif pr == 'A' %} High severity CVSS plus elevated EPSS likelihood. {% elif pr == 'B' %} High severity CVSS with lower EPSS probability. {% elif pr == 'C' %} Lower CVSS severity but elevated EPSS likelihood. {% elif pr == 'D' %} Lower severity and lower EPSS probability. {% else %} Insufficient signals for a calculated priority. {% endif %}

Public Exploits
{% if github_count > 0 %}
GitHub
{% endif %} {% if vulncheck_count > 0 %}
VulnCheck
    {% for item in cve['VulnCheck Data']['data'] %} {% for xdb in item['vulncheck_xdb'] %} {% set url = xdb['clone_ssh_url'].replace('git@github.com:', 'https://github.com/').replace('.git','') %}
  • {{ url }}
  • {% endfor %} {% endfor %}
{% endif %} {% if edb_count > 0 %}
Exploit‑DB
{% endif %} {% if msf_count > 0 %}
Metasploit
    {% for m in cve['Metasploit Data']['modules'] %} {% set label = m.get('fullname') ~ (m.get('rank_label') and (' [' ~ m.get('rank_label') ~ ']') or '') %} {% if m.get('url') %}
  • {{ label }}
  • {% else %}
  • {{ label }}
  • {% endif %} {% endfor %}
{% endif %} {% if nuclei_link %} {% endif %} {% if (github_count + vulncheck_count + edb_count + (nuclei_link and 1 or 0)) == 0 %}
No public exploits found.
{% endif %}
CISA KEV Catalog
{% if cisa_listed %} Listed {% else %} Not Listed {% endif %} Ransomware: {{ cve['CISA Data'] and cve['CISA Data'].get('ransomware_use','Unknown') or 'Unknown' }}
HackerOne
{% if cve['HackerOne Data'] and cve['HackerOne Data'].get('data') and cve['HackerOne Data']['data'].get('cve_entry') %} {% set h1 = cve['HackerOne Data']['data']['cve_entry'] %}
Rank: {{ h1.get('rank','N/A') }} Reports: {{ h1.get('reports_submitted_count','N/A') }} Critical: {{ h1.get('severity_count_critical',0) }} High: {{ h1.get('severity_count_high',0) }} Medium: {{ h1.get('severity_count_medium',0) }} Low: {{ h1.get('severity_count_low',0) }} Unknown: {{ h1.get('severity_count_unknown',0) }}
{% else %}
No HackerOne data available.
{% endif %}
{% if cve['Risk Assessment'] %}
🤖 AI-Powered Risk Assessment
{{ cve['Risk Assessment'] }}
{% endif %}
References
{% if references %} {% else %}
No further references.
{% endif %}
{% endfor %}