CVE-to-PoC Mapper avatar

CVE-to-PoC Mapper

Pricing

from $1.00 / 1,000 results

Go to Apify Store
CVE-to-PoC Mapper

CVE-to-PoC Mapper

Maps CVEs to publicly available Proof-of-Concept code. Scrapes GitHub, ExploitDB, and NVD to answer: is there a working exploit, which versions are affected, and is a patch available?

Pricing

from $1.00 / 1,000 results

Rating

0.0

(0)

Developer

Sreenivasan S

Sreenivasan S

Maintained by Community

Actor stats

0

Bookmarked

2

Total users

1

Monthly active users

4 days ago

Last modified

Share

What does CVE-to-PoC Mapper do?

CVE-to-PoC Mapper maps CVE identifiers to publicly available Proof-of-Concept code in seconds. Give it a CVE ID (like CVE-2024-6387) and it automatically searches GitHub, ExploitDB, and the NVD (National Vulnerability Database) to answer three critical questions:

  • Is there a working exploit? - Finds PoC repositories on GitHub and published exploits on ExploitDB
  • Which versions are affected? - Extracts affected product and version ranges from NVD CPE data
  • Is a patch available? - Collects vendor advisories and patch links

Built on the Apify platform, you get API access, scheduling, proxy rotation, and monitoring without managing infrastructure. Run it once, or schedule it to monitor new CVEs as they're published.

Why use CVE-to-PoC Mapper?

For security researchers and red teams: Stop manually searching GitHub and ExploitDB for every CVE. One API call gives you the full picture.

For blue teams and SOC analysts: When a new critical CVE drops, instantly know if public exploit code exists and which of your systems are in the affected version range.

For threat intelligence platforms: Integrate CVE enrichment into your pipelines via the Apify API. Enrich alerts with PoC availability and CVSS data automatically.

How to use CVE-to-PoC Mapper

  1. Create a free Apify account at console.apify.com
  2. Open CVE-to-PoC Mapper in the Apify Store
  3. Go to the Input tab and enter your CVE IDs
  4. Click Start and wait a few seconds
  5. Download results from the Output tab in JSON, CSV, Excel, or HTML

You can also call it programmatically via the Apify API for integration into your existing tools.

Input

The actor accepts a JSON object with these fields:

FieldTypeRequiredDefaultDescription
cveIdsstring[]Yes-List of CVE IDs to look up (e.g. ["CVE-2024-6387"])
maxGitHubResultsintegerNo10Max GitHub repos to return per CVE (1-100)
includeGitHubbooleanNotrueSearch GitHub for PoC repositories
includeExploitDbbooleanNotrueSearch ExploitDB for published exploits
githubTokenstringNo-GitHub PAT for higher API rate limits
nvdApiKeystringNo-NVD API key for higher rate limits

Example input:

{
"cveIds": ["CVE-2024-6387", "CVE-2024-3094", "CVE-2021-44228"],
"maxGitHubResults": 5,
"includeGitHub": true,
"includeExploitDb": true
}

Output

The actor returns an array of CVE result objects. You can download the dataset in various formats such as JSON, HTML, CSV, or Excel.

{
"cveId": "CVE-2024-6387",
"description": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server...",
"cvssScore": 8.1,
"severity": "HIGH",
"cweIds": ["CWE-364", "CWE-362"],
"affectedProducts": [
{
"vendor": "openbsd",
"product": "openssh",
"versionStart": null,
"versionEnd": "9.8p1",
"versionStartIncluding": false,
"versionEndExcluding": true
}
],
"patchUrls": ["https://www.openssh.com/releasenotes.html"],
"nvdUrl": "https://nvd.nist.gov/vuln/detail/CVE-2024-6387",
"publishedDate": "2024-07-01T13:15:06.467",
"lastModifiedDate": "2025-09-30T13:52:23.540",
"githubPocUrls": [
{
"repoUrl": "https://github.com/xaitax/CVE-2024-6387_Check",
"repoName": "xaitax/CVE-2024-6387_Check",
"description": "CVE-2024-6387 (regreSSHion) vulnerability checker",
"stars": 523,
"lastUpdated": "2024-07-15T00:00:00Z",
"isArchived": false
}
],
"exploitDbResults": [
{
"edbId": "51234",
"title": "OpenSSH 9.8p1 - Remote Code Execution (RCE)",
"author": "researcher",
"type": "remote",
"platform": "Linux",
"exploitUrl": "https://www.exploit-db.com/exploits/51234"
}
],
"scrapedAt": "2026-05-07T16:00:00.000Z",
"errors": []
}

Data table

FieldDescription
cveIdThe CVE identifier
cvssScoreCVSS v3.1 base score (0-10, null if unavailable)
severitySeverity level (CRITICAL, HIGH, MEDIUM, LOW, or null)
descriptionEnglish vulnerability description from NVD
cweIdsCWE weakness identifiers (e.g. CWE-362)
affectedProductsArray of affected vendor/product/version ranges (from CPE)
patchUrlsVendor advisory and patch URLs
nvdUrlDirect link to NVD detail page
githubPocUrlsGitHub repositories matching the CVE (name, URL, stars, description)
exploitDbResultsExploitDB entries matching the CVE (EDB-ID, title, type, platform, author)
publishedDateCVE publication date
lastModifiedDateCVE last modification date
scrapedAtTimestamp when this lookup was performed
errorsNon-fatal errors encountered during lookup (empty array = clean run)

Pricing / Cost estimation

CVE-to-PoC Mapper uses Apify's pay-per-event pricing model.

$3 per 1,000 results. A single CVE lookup typically generates 3-10 results (NVD base + GitHub repos + ExploitDB entries), costing approximately $0.01-0.03 per CVE.

Apify offers a free tier for low-volume usage. Check the Apify Console for your current usage and billing details.

Tips

  • Speed up runs: Set includeExploitDb: false if you only need GitHub PoCs. This skips browser automation and cuts runtime by ~50%.
  • Batch efficiently: Process up to 10 CVEs per run. Each CVE takes ~5s with ExploitDB enabled or ~2s with NVD + GitHub only.
  • Rate limits: Add a githubToken (free personal access token from GitHub) to increase GitHub search API limits from 10/min to 30/min.
  • NVD API key: Request a free key from nvd.nist.gov for higher NVD API rate limits on large batches.
  • Automate monitoring: Use Apify Schedules to re-scan CVEs daily and catch newly published PoCs.

FAQ, disclaimers, and support

Is this legal? Yes. The actor only scrapes publicly available data from NVD (US government database), GitHub (public repositories), and ExploitDB (public exploit database). It respects rate limits and does not access private or authentication-walled content.

What CVEs are supported? Any CVE published in the NVD. The actor validates CVE ID format (CVE-YYYY-NNNNN) automatically and skips invalid IDs.

Are the exploits safe to use? The actor maps CVEs to PoC URLs only. It does not execute, validate, or endorse any exploit code. Always exercise caution when running third-party exploit code.

ExploitDB returned 0 results for my CVE - why? Not all CVEs have ExploitDB entries. ExploitDB contains a curated set of published exploits, not a complete mapping of all CVEs.

Getting help: For bugs, feature requests, or questions, open an issue on the GitHub repository or use the Issues tab in Apify Console.

Custom solutions: Need a custom version with additional data sources (Metasploit, Shodan, Censys) or batch processing of hundreds of CVEs? Contact the developer through the Apify Store.


Built with Crawlee + Playwright by Sreeniverse.