Discover how to obtain the list of vulnerabilities.
We are aware of the difficulty of obtaining a precise list of vulnerabilities actually applicable to a specific version.The main objective behind Verdex is to quickly identify the vulnerabilities associated with the detected version.The list of vulnerabilities is automatically displayed at the end of a successful scan, as well as in the output files.
To provide accurate vulnerabilities, Verdex relies on search-vulns.com CVE data and first.org EPSS data.
👉 Click on the screenshot below to enlarge
More CVE data are available in output files (see below).
Here is data example for CVE-2022-4361 on Keycloak:
Copy
{ "id": "CVE-2022-4361", "description": "Keycloak, an open-source identity and access management solution, has a cross-site scripting (XSS) vulnerability in the SAML or OIDC providers. The vulnerability can allow an attacker to execute malicious scripts by setting the AssertionConsumerServiceURL value or the redirect_uri.", "cvss_score": 10, "epss_score": 0.00311, "is_kev": false, "vulnerable_versions": [ "21.0.2" ], "published_at": "2023-07-07"},