How We Assess CVE Risk

wtfisthiscve goes beyond basic CVSS scores to help you understand the real-world risk of each vulnerability. We check multiple sources to answer two critical questions:


Detection Sources

We check whether a CVE can be detected by major open-source security tools:

OSV.dev (Open Source Vulnerabilities)

Nuclei Templates

Sigma Rules

Snort/Suricata Rules

YARA Rules

Semgrep Rules


Exploit Sources

We track whether working exploit code exists in the wild:

Metasploit Framework

ExploitDB

GitHub PoCs

CISA KEV (Known Exploited Vulnerabilities)


Risk Levels Explained

Based on detection and weaponization status, we assign a risk level:

Risk Level Meaning Action
CRITICAL GAP Exploits exist but NO detection available Highest priority - you're blind to active attacks
HIGH Exploits exist AND detection available Urgent - ensure your detection tools are deployed
MEDIUM Detection available but no known exploits Important - detection gives you early warning
LOW No known exploits or detection Monitor - theoretical risk only

What is a "Critical Gap"?

A Critical Gap is the most dangerous category: attackers have working exploit code, but defenders have no way to detect attacks using standard open-source tools.

These CVEs represent a pre-outbreak window - the opportunity to build detection BEFORE mass exploitation begins. We highlight these specifically because:

Note: Critical Gap status only applies to HIGH and CRITICAL severity CVEs (CVSS 7.0+). Lower severity vulnerabilities with exploits but no detection are classified as HIGH risk.


EPSS Scores

In addition to detection/exploit status, we show EPSS (Exploit Prediction Scoring System) scores where available.

EPSS complements CVSS by answering "how likely?" rather than "how bad?". A CVSS 7.0 with 90% EPSS is more urgent than a CVSS 9.0 with 0.1% EPSS.


Data Freshness


Limitations

Our detection coverage checks are not exhaustive:


Questions or Feedback?

If you know of detection rules or exploits we're missing, please open an issue on GitHub.