Vulnerabilities prioritized by real-world exploitation.

CVSS-only prioritization rewards theoretical severity over real-world risk. Vulnerability Management ranks vulnerabilities by what's actually being exploited, using EPSS exploit-prediction and CISA KEV active-exploitation flags alongside CVSS.

WHAT THIS WORKFLOW LOOKS LIKE

Detection plus prioritization that tracks reality.

Vulnerability-management teams, patching operations, and detection-engineering functions run this workflow. The question they answer: of the thousands of CVEs detected on our external surface, which ones actually need attention this week? Pre-Deepinfo, the answer comes from CVSS rankings that don't reflect what's being exploited. Post-Deepinfo, the answer comes from multi-signal scoring that weights real-world exploitation.

Detection runs continuously on monitored assets via web technology fingerprinting. Each CVE detected is enriched with EPSS (probability of exploitation in next 30 days) and CISA KEV (confirmed active exploitation). Per-CVE detail includes CVSS components, EPSS history, KEV status with date added, CWE class, CAPEC patterns, exploit availability, and affected products.

Outcomes: patching teams focus on what's being actively exploited, not what's theoretically critical; KEV-listed CVEs get top-of-queue treatment; detection-engineering teams build coverage matching specific actor TTPs through CWE/CAPEC mapping.

HOW DEEPINFO HANDLES IT

CVSS, EPSS, KEV, and the math underneath.

Continuous detection via web technology fingerprinting. Per-CVE enrichment with EPSS exploit-prediction and CISA KEV active-exploitation flags. Per-CVE detail with CWE, CAPEC, exploit-availability, and affected-product context.

CVSS baseline.

Common Vulnerability Scoring System for severity baseline. Necessary, not sufficient. CVSS-only ranking misses what's actually being exploited.

EPSS exploit prediction.

Exploit Prediction Scoring System probability that a CVE will be exploited in the next 30 days. Per-CVE EPSS history shows how the prediction has shifted as exploit data accumulated.

CISA KEV confirmed exploitation.

CVEs confirmed exploited in the wild. Every CVE in the platform carries a KEV flag; KEV-listed CVEs jump to the top of the queue.

Per-CVE detail.

CWE class with parent/child relationships, CAPEC attack pattern links, exploit-availability indicators, affected products list. Cross-references to related CVEs via shared CWE class.

“Patching the top-of-CVSS list missed exploited vulnerabilities lower in the rankings. Prioritizing by EPSS plus CISA KEV moved patching to where exploitation actually happens.”

— Vulnerability Manager, Industrial Conglomerate
PRIORITIZE BY REAL RISK

See your vulnerability landscape ranked by real-world exploitation.

Run Deepinfo against your domain. The free threat exposure report includes EPSS+KEV-ranked CVEs across your external surface.

Request a demo