CVE Threat Prioritizer — NIST + CISA + FIRST EPSS avatar

CVE Threat Prioritizer — NIST + CISA + FIRST EPSS

Pricing

Pay per usage

Go to Apify Store
CVE Threat Prioritizer — NIST + CISA + FIRST EPSS

CVE Threat Prioritizer — NIST + CISA + FIRST EPSS

Stop triaging CVEs manually. Combines NIST NVD severity, CISA Known Exploited status, and FIRST EPSS exploit probability into a single priority score — plus patch availability and affected product count. Know which vulnerabilities to fix today.

Pricing

Pay per usage

Rating

0.0

(0)

Developer

daehwan kim

daehwan kim

Maintained by Community

Actor stats

0

Bookmarked

2

Total users

1

Monthly active users

6 hours ago

Last modified

Share

Stop manually cross-referencing NVD, CISA, and FIRST spreadsheets. Get a single priority score, patch status, and affected product count for any CVE — in one API call.

What it does

Most vulnerability scanners give you a raw CVSS score and stop there. CVSS alone doesn't tell you if a vulnerability is being actively exploited, how likely exploitation is in the next 30 days, or whether a patch even exists. This Actor combines three independent signals:

SourceSignalWhy it mattersLicense
NIST NVDCVSS score (0–10) + attack vectorBase severity and exploitabilityUS Government Public Domain
CISA KEVKnown Exploited Vulnerabilities catalogActive exploitation confirmed by governmentUS Government Public Domain
FIRST EPSSExploit Prediction Scoring System (0–1)Probability of exploitation in next 30 daysPublic

Priority Score Formula

Priority = (CVSS × 0.3) + (EPSS × 10 × 0.3) + KEV_bonus(3) + Ransomware_bonus(1)
ScorePriorityAction
≥ 6CRITICALPatch immediately
≥ 4HIGHPatch within 7 days
≥ 2MEDIUMSchedule next sprint
< 2LOWMonitor

Input

{
"cveIds": ["CVE-2021-44228", "CVE-2022-30190", "CVE-2023-44487"],
"keyword": "apache",
"minCvssScore": 7.0
}
FieldTypeDefaultDescription
cveIdsstring[]Log4Shell, PrintNightmare, HTTP/2 Rapid ResetSpecific CVE IDs to analyze
keywordstringSearch NVD for all HIGH CVEs matching a keyword
minCvssScorenumber7.0Skip CVEs below this score (unless in CISA KEV)

Output

{
"_summary": {
"total": 3,
"critical": 2,
"high": 1,
"knownExploited": 2,
"ransomwareLinked": 1,
"patchAvailable": 3,
"networkExposure": 3
}
},
{
"cveId": "CVE-2021-44228",
"description": "Apache Log4j2 2.0-beta9 through 2.15.0 JNDI features...",
"cvssScore": 10.0,
"severity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"epssScore": 0.9754,
"epssPercentile": 0.99996,
"isKnownExploited": true,
"cisaDueDate": "2021-12-24",
"ransomwareUse": "Known",
"patchAvailable": true,
"patchUrls": ["https://logging.apache.org/log4j/2.x/security.html"],
"affectedProductsCount": 214,
"priorityScore": 7.97,
"priority": "CRITICAL",
"published": "2021-12-10T10:15:09.143"
}

Use Cases

  • Security teams — replace manual CVE triage spreadsheets with automated priority queues
  • DevSecOps pipelines — integrate into CI/CD to flag CRITICAL CVEs before merge
  • Vulnerability management platforms — enrich scanner output with EPSS + KEV data
  • Compliance reporting — generate evidence of vulnerability prioritization methodology
  • MSSP / MDR services — automate client vulnerability briefings

Why this beats building it yourself

Three separate API integrations, CISA KEV XML parsing, EPSS batch queries, NVD CPE parsing for affected product count, patch URL extraction from NVD references — all combined with a weighted scoring formula. This Actor does all of it in a single run.

Attribution