Vulnerabilities
Discover how to obtain the list of vulnerabilities and update recommendations.
This feature requires Expert API key, see how to Become Expert
We are aware of the difficulty of obtaining a precise list of vulnerabilities actually applicable to a specific version.
The main objective behind Verdex is to quickly identify the vulnerabilities associated with the detected version and determine update recommendations (nearest non-vulnerable version).
Each CVE is reviewed manually, to provide accurate vulnerable versions and available patches. New CVEs are added as they become available.
👉  Click on the screenshot below to enlarge
More CVE data are available in output files (see below).
Usage
To obtain details of vulnerabilities and update recommendations, simply provide the Expert API key with -key
:
The list of vulnerabilities will be automatically displayed at the end of a successful scan, as well as in the output files.
If you don’t have an Expert API key yet, find out how to Become Expert.
Available CVE data
Here are CVE data available in Verdex output files:
- CVE ID (
CVE-YYYY-XXXX
) - GitHub Security Advisory ID if applicable (
GHSA-xxxx-yyyy-zzzz
) - Summary of the vulnerability description
- Description
- Severity (
critical
,high
,medium
,low
orN/A
) - CVSS score preferably v3.1 if available
- EPSS score updated daily from first.org API
- Vulnerable versions (eg.
< 22.0.13 || >= 23.* < 23.0.6
) - Nearest patched version (NPV) (eg.
23.0.6
if version 23.0.0 detected) - Nuclei Template ID if applicable
- Known Exploited Vulnerability (KEV) registration date if applicable
- List of public GitHub POCs if applicable
- List of reference links (patch releases, security advisories, …)
- Vendor advisory if applicable
- Publication date
- Latest update date
Here is data example for CVE-2024-8698
on Keycloak:
Update recommendations
After the list of vulnerabilities, Verdex displays several recommendations for updating the service, including:
- Nearest version without any vulnerabilities
- Nearest version without critical vulnerabilities (CVSS ≥ 9)
Don’t hesitate to open a feature request if you need any additional data - we’ll be happy to add them to Verdex!