Security Vulnerability Prioritizer - Fix First Guide
Pricing
$50.00 / 1,000 cves-analyzeds
Security Vulnerability Prioritizer - Fix First Guide
Find out which security vulnerabilities are most dangerous and likely to be exploited. Know what to fix first.
Pricing
$50.00 / 1,000 cves-analyzeds
Rating
0.0
(0)
Developer
daehwan kim
Actor stats
0
Bookmarked
1
Total users
0
Monthly active users
2 days ago
Last modified
Categories
Share
CVE Threat Prioritizer — NIST + CISA + FIRST EPSS
Stop manually cross-referencing NVD, CISA, and FIRST spreadsheets. Get a single priority score, patch status, and affected product count for any CVE — in one API call.
What it does
Most vulnerability scanners give you a raw CVSS score and stop there. CVSS alone doesn't tell you if a vulnerability is being actively exploited, how likely exploitation is in the next 30 days, or whether a patch even exists. This Actor combines three independent signals:
| Source | Signal | Why it matters | License |
|---|---|---|---|
| NIST NVD | CVSS score (0–10) + attack vector | Base severity and exploitability | US Government Public Domain |
| CISA KEV | Known Exploited Vulnerabilities catalog | Active exploitation confirmed by government | US Government Public Domain |
| FIRST EPSS | Exploit Prediction Scoring System (0–1) | Probability of exploitation in next 30 days | Public |
Priority Score Formula
Priority = (CVSS × 0.3) + (EPSS × 10 × 0.3) + KEV_bonus(3) + Ransomware_bonus(1)
| Score | Priority | Action |
|---|---|---|
| ≥ 6 | CRITICAL | Patch immediately |
| ≥ 4 | HIGH | Patch within 7 days |
| ≥ 2 | MEDIUM | Schedule next sprint |
| < 2 | LOW | Monitor |
Input
{"cveIds": ["CVE-2021-44228", "CVE-2022-30190", "CVE-2023-44487"],"keyword": "apache","minCvssScore": 7.0}
| Field | Type | Default | Description |
|---|---|---|---|
cveIds | string[] | Log4Shell, PrintNightmare, HTTP/2 Rapid Reset | Specific CVE IDs to analyze |
keyword | string | — | Search NVD for all HIGH CVEs matching a keyword |
minCvssScore | number | 7.0 | Skip CVEs below this score (unless in CISA KEV) |
Output
{"_summary": {"total": 3,"critical": 2,"high": 1,"knownExploited": 2,"ransomwareLinked": 1,"patchAvailable": 3,"networkExposure": 3}},{"cveId": "CVE-2021-44228","description": "Apache Log4j2 2.0-beta9 through 2.15.0 JNDI features...","cvssScore": 10.0,"severity": "CRITICAL","attackVector": "NETWORK","attackComplexity": "LOW","epssScore": 0.9754,"epssPercentile": 0.99996,"isKnownExploited": true,"cisaDueDate": "2021-12-24","ransomwareUse": "Known","patchAvailable": true,"patchUrls": ["https://logging.apache.org/log4j/2.x/security.html"],"affectedProductsCount": 214,"priorityScore": 7.97,"priority": "CRITICAL","published": "2021-12-10T10:15:09.143"}
Use Cases
- Security teams — replace manual CVE triage spreadsheets with automated priority queues
- DevSecOps pipelines — integrate into CI/CD to flag CRITICAL CVEs before merge
- Vulnerability management platforms — enrich scanner output with EPSS + KEV data
- Compliance reporting — generate evidence of vulnerability prioritization methodology
- MSSP / MDR services — automate client vulnerability briefings
Why this beats building it yourself
Three separate API integrations, CISA KEV XML parsing, EPSS batch queries, NVD CPE parsing for affected product count, patch URL extraction from NVD references — all combined with a weighted scoring formula. This Actor does all of it in a single run.
Attribution
- NIST NVD: https://nvd.nist.gov
- CISA KEV: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- FIRST EPSS: https://www.first.org/epss