{{ cve_id }}
{% if pr %} {{ pr }} {% endif %} {% if cisa_listed %} CISA KEV {% endif %} {% if (github_count + vulncheck_count + edb_count + msf_count + (nuclei_link and 1 or 0)) > 0 %} Has Exploits {% endif %} {% if cve['Risk Assessment'] %} AI {% endif %}{{ description }}
{% if pr == 'A+' %} Elevated risk due to CISA listing or public exploits present. {% elif pr == 'A' %} High severity CVSS plus elevated EPSS likelihood. {% elif pr == 'B' %} High severity CVSS with lower EPSS probability. {% elif pr == 'C' %} Lower CVSS severity but elevated EPSS likelihood. {% elif pr == 'D' %} Lower severity and lower EPSS probability. {% else %} Insufficient signals for a calculated priority. {% endif %}
-
{% for poc in cve['GitHub Data']['pocs'] %}
- {{ poc['html_url'] }} {% endfor %}
-
{% for item in cve['VulnCheck Data']['data'] %}
{% for xdb in item['vulncheck_xdb'] %}
{% set url = xdb['clone_ssh_url'].replace('git@github.com:', 'https://github.com/').replace('.git','') %}
- {{ url }} {% endfor %} {% endfor %}
-
{% for item in cve['ExploitDB Data'] %}
- https://www.exploit-db.com/exploits/{{ item['id'] }} {% endfor %}
-
{% for m in cve['Metasploit Data']['modules'] %}
{% set label = m.get('fullname') ~ (m.get('rank_label') and (' [' ~ m.get('rank_label') ~ ']') or '') %}
{% if m.get('url') %}
- {{ label }} {% else %}
- {{ label }} {% endif %} {% endfor %}
🤖 AI-Powered Risk Assessment
{{ cve['Risk Assessment'] }}
-
{% for ref in references %}
- {{ ref['url'] }} {% endfor %}