New Features: Critical Indicators & Known Exploitation Calendar Heatmap

We built critical indicators to explain the reasoning behind any CVE’s Empirical Score (0% to 100% real-world exploitation risk). Every CVE we analyze is modeled against over 2,000 data points. We took these model weight contributions and grouped them into the following categories: Chatter, Exploitation, Threat Intelligence, Vulnerability Attributes, Exploit Code, References, and Vendor. This makes it easier than ever to see why a vulnerability matters.


How to read Critical Indicators

In our web UI, we use a combination of color, icons, and text to visually show the impact for each critical indicator category. In the example shown below, Exploit Code strongly increases this CVE’s score because our GitHub Exploit model has identified many published code examples. Attackers could discover these code snippets and weaponize this vulnerability.

Not all evidence increases a CVE’s score. We also show how critical indicator contributions can reduce a CVE’s score. Our goal is to provide transparency and clearly show the evidence that supports our models.

CVE Detail Page

Critical Indicators Key

Critical Indicators API Example

Known Exploitation Calendar Heatmap

We also released a new heatmap that shows the past 365 days of exploitation activity for every CVE in our database. This timeline is updated daily, so our users can make informed decisions. Darker colored squares indicate more known exploitation activity has been recorded on that day compared to other days.

CVE Detail Page

Next
Next

Risk Model Slop