CVE Directory
Introduction
The CVE Directory in AttackMetricx acts as a centralized intelligence hub for vulnerabilities. It doesn’t just list CVEs it enriches them with context, risk indicators, and exploit intelligence so teams can move from awareness to action instantly. With continuous daily updates, organizations always operate with the most current vulnerability data.
Vulnerability Intelligence Summary
At the top of the CVE Directory, you’ll find high-level counters summarizing the global state of vulnerabilities:
Total – The overall number of CVEs currently tracked by the platform.
KVE (Known Vulnerability Exploits) – Shows how many CVEs are actively exploited or weaponized in the wild.
CVEs Added (7 Days) – Tracks the number of new vulnerabilities added in the past week, giving visibility into fresh threats.
Last Update – Confirms the exact date of the latest synchronization, ensuring data freshness.
This snapshot saves analysts from guesswork by showing the scale and recency of the threat landscape at a glance.
Search & CVE List
The main directory view presents a dynamic, filterable table of vulnerabilities, where each row includes:
CVE ID – Unique identifier (e.g., CVE-2025-10475).
EPSS (Exploit Prediction Scoring System) – Percentage likelihood of exploitation.
CPR (Cyber Prioritization Rating) – Business impact score under real-world conditions.
Vendors / Products – The affected vendor(s) and product(s).
CVSS v3 / v2 – Standardized severity scores.
KVE – Whether the CVE is linked to a known exploit.
Last Update – Timestamp of the last update to this entry.
This transforms what would otherwise be a static CVE list into a prioritization engine.
CVE Detail View
Clicking the arrow on any row opens a dedicated CVE detail panel. This view provides everything needed to understand the vulnerability in depth.
Details Section
Each CVE entry contains:
Description → Technical summary of the weakness, affected component, and impact.
Source → The reporting CNA or intelligence provider.
Status → The reporting lifecycle stage (e.g., Received, Validated).
Actively Exploited → Indicates if the CVE is already seen in real-world attacks.
Known by Ransomware → Flags if ransomware groups are leveraging it.
EPSS & CPR → Risk prediction and prioritization scores.
Published & Last Modified → Key dates for vulnerability lifecycle tracking.
CVSS Scoring Across Versions
Unlike many tools that stick to a single scoring version, AttackMetricx presents CVSS v4.0, v3.1, and v2.0 side by side.
This allows teams to see how severity is interpreted under multiple frameworks, ensuring no blind spots in compliance or patch prioritization.
Alongside these, a visual exploitability gauge (percentage score) distills complex signals into an immediate risk snapshot.
Attack Vector & Exploit Conditions
Additional contextual attributes help clarify the practical difficulty of exploitation:
Attack Vector (e.g., Local, Network)
Attack Complexity (Low / High)
Attack Requirements (dependencies)
Privileges Required (None / Low / High)
User Interaction (whether exploitation requires user action)
This ensures teams don’t just see “severity”—they understand the real-world effort an attacker needs.
References
Each CVE entry comes with curated external references, such as:
Vendor advisories
Public changelogs
Security research writeups
VulDB and other intelligence portals
This makes it effortless to pivot from detection to remediation guidance.
Why This Matters
Static CVE lists overwhelm organizations with volume. AttackMetricx changes the game by enriching every CVE with actionable intelligence exploitation likelihood, ransomware connections, and practical conditions.
This enables:
Executives → to quickly gauge organizational exposure.
SOC Analysts & Threat Hunters → to focus patching on what attackers are actually using today.
Blue Teams → to tighten defenses against ransomware weaponization.
Last updated
Was this helpful?