We are aware of the difficulty of obtaining a precise list of vulnerabilities actually applicable to a specific version.
The main objective behind Verdex is to quickly identify the vulnerabilities associated with the detected version.
The list of vulnerabilities is automatically displayed at the end of a successful scan, as well as in the output files.
To provide accurate vulnerabilities, Verdex relies on search-vulns.com CVE data and first.org EPSS data.
👉 Click on the screenshot below to enlarge
More CVE data are available in output files (see below).
Available CVE data
Here are CVE data available in Verdex output files:
- CVE ID (
CVE-YYYY-XXXX
)
- Description
- CVSS score preferably v3.1 if available
- EPSS score from first.org API
- Vulnerable versions
- Is it a Known Exploited Vulnerability (KEV)
- Publication date
Here is data example for CVE-2022-4361
on Keycloak:
{
"id": "CVE-2022-4361",
"description": "Keycloak, an open-source identity and access management solution, has a cross-site scripting (XSS) vulnerability in the SAML or OIDC providers. The vulnerability can allow an attacker to execute malicious scripts by setting the AssertionConsumerServiceURL value or the redirect_uri.",
"cvss_score": 10,
"epss_score": 0.00311,
"is_kev": false,
"vulnerable_versions": [
"21.0.2"
],
"published_at": "2023-07-07"
},