VulnWatch UK

Static • GitHub Pages–ready KEV + EPSS enrichment UK Gov compliance notes

Exploit & vulnerability OSINT portal — integrates CISA KEV (in-the-wild exploitation) and FIRST EPSS (likelihood), with links to NVD, CVE.org, Exploit-DB, AttackerKB, and OSV. Built for passive intelligence, triage, and lab-only validation.

Live Dashboard — KEV × EPSS

Data sources: CISA KEV (GitHub mirror)  |  FIRST EPSS API

Loading…
CVE Vendor / Product Title Date Added Due EPSS Links

Prioritisation Model

1) Confirm “exploited-in-the-wild”

Treat items in CISA KEV as highest priority for triage and remediation.

Reference: CISA KEV

2) Likelihood × Impact

Use EPSS (probability of exploitation) alongside impact metrics (CVSS from NVD/vendor) to rank where to focus first.

Reference: EPSS (v4), NVD API

3) Exploitability & Context

Check availability and quality of PoCs (e.g., Exploit-DB) and community context (e.g., AttackerKB). Validate only in a sandboxed lab.

Reference: Exploit-DB, AttackerKB

OSINT Sources & Tooling

Feeds & Databases

Recon & Validation

Quick Lookups

Opens tabs for NVD, CVE.org, Exploit-DB, AttackerKB, OSV for the CVE ID.

Doctrine & Compliance (UK Gov)

Built from two research reports: (1) Top Free OSINT Tools (multi-category survey) and (2) UK Gov OSINT Tools Research (licensing, OPSEC, doctrine). Key tenets:

Operational notes
  • Use isolated VMs, non-attributable egress, strict API-key handling, and evidence chain-of-custody.
  • Prefer vendor PSIRTs and official guidance for patching context; handle PoCs in a sandbox only.
  • Beware malicious PoCs in public repos; vet before execution.