Exploit-DB Ranking: Every Pentestas Finding Links to the Best Public Exploit
Pentestas Team
Security Analyst

Three match types, three confidence bands, sorted by signal strength.
Exploit-DB has the answer — for most CVEs, there's at least one public exploit, and for many, a dozen. The hard part is picking the right one. Pentestas ranks candidates automatically, per-finding, using three signals and a decay function.
In Detail
The three match types
CVE-exact
The finding claims CVE-YYYY-NNNNN. An Exploit-DB entry lists the same CVE. Highest confidence tier. If the finding is real in your environment, the linked EDB entry is almost certainly a drop-in PoC that works against you (assuming version match).
CPE + version
The finding detected <product> at <version>. The EDB entry's platform + title names the same product, and the entry's publication date predates a patch that would have fixed it. Medium confidence. Useful when the finding didn't cite a specific CVE but the stack fingerprint + vulnerable-version combination strongly implies one.
Product keyword
The finding mentions a product (WordPress, phpMyAdmin, Confluence, Jenkins, GitLab) without a CVE. Keyword match against the EDB title. Lowest confidence — useful as a research starting point, not a drop-in exploit.
In Detail
The scoring function
Each candidate gets a 0.0–1.0 confidence score combining:
- **Match type base.*CVE-exact starts at 0.8; CPE+version at 0.6; keyword at 0.3.
- **Verified flag.*EDB's own "verified" flag (the EDB maintainers confirmed the exploit works) bumps by 0.1.
- **Age decay.*Exploits older than 5 years decay 0.02/year — newer exploits against current stacks rank higher than old ones.
- **Platform alignment.*Linux-only exploit against a Windows target: 0.0 (drop).
webappsagainst a web target: +0.05. - **Type alignment.*Exploit type
remoteis more useful thandos;remote>webapps>local>dos>shellcode>papers.
Output is sorted descending. Pentestas displays the top 5 per finding.
In Detail
Per-finding output
Each finding's JSON includes an exploit_candidates array:
{
"exploit_candidates": [
{
"edb_id": 51234,
"confidence": 0.97,
"match_type": "cve-exact",
"rationale": "CVE-2021-41773 matches; EDB entry verified; version match on Apache 2.4.49",
"title": "Apache 2.4.49 - Path Traversal & Remote Code Execution",
"platform": "multiple",
"type": "remote",
"date_published": "2021-10-05",
"verified": true,
"cves": ["CVE-2021-41773"],
"edb_source_url": "https://exploit-db.com/exploits/51234"
},
...
]
}The scan-detail UI renders this as a clickable list. Each row links directly to exploit-db.com for the full source.
The Problem
Why matching is harder than it looks
A naive implementation would match only by CVE. Two problems:
- Many real-world findings don't have a CVE — bespoke application bugs, logic errors, auth flaws. Pentestas AI pentest surfaces plenty of these; they still deserve EDB context where available.
- Even CVE-flagged findings often have multiple candidate exploits with subtly different reliability / target constraints. A naive "first match wins" approach picks the wrong exploit roughly 30% of the time in our testing.
Pentestas's three-pass matcher + confidence scoring picks the best candidate consistently. Customer-reported "the top match was the one I would have picked manually" rate: >90%.
In Detail
Freshness
Pentestas mirrors Exploit-DB nightly via a scheduled Celery task. Freshness is usually <24 hours. Enterprise customers on the production-critical tier can enable hourly refresh.
Newly-disclosed CVEs with published exploits land in the ranker within one scan cycle. A morning-vulnerability-disclosure + evening-Pentestas-rescan pipeline gives you a same-day answer on whether a newly-armed CVE affects your estate.
By Industry
Industry scenarios
Fintech
A fintech stack running a payment-adjacent service (Redis, Elastic, RabbitMQ, Envoy) accumulates version-specific vulnerabilities constantly. Pentestas's network-scan mode fingerprints each service's version, cross-references EDB, and flags the top-ranked exploit per service. The weekly network scan produces a prioritised patching queue tied to actual exploitability rather than CVSS-only severity.
Medtech
Medtech platforms often inherit legacy dependencies (older Java frameworks, custom-forked libraries). The keyword-match tier catches cases where the dependency name doesn't map cleanly to a CVE but a documented exploit exists against that specific library family. Useful for pre-FDA-audit scan runs.
Legaltech
Legal platforms frequently run on PDF + document-processing libraries with long vulnerability histories (Ghostscript, ImageMagick, Tika, Apache PDFBox). The CPE+version tier ranks the active exploits against whichever version your pipeline runs.
Banks + insurance
Both sectors depend heavily on legacy middleware (message buses, RPC frameworks, ESBs). Pentestas's network-scan mode + EDB ranking produces the "which public exploits are live against our current middleware version" view that internal risk committees want. Ties directly into DORA / FFIEC CAT "vulnerable-dependency remediation" programme evidence.
How It Works
How it improves triage
Without EDB ranking, each finding triggers a Google dive: "Apache 2.4.49 CVE-2021-41773 exploit". You find seven results; two are blog posts, one is a Twitter thread, one is EDB, three are noise. 10 minutes to orient.
With EDB ranking, the finding opens with the top EDB candidate pre-linked, rationale written, date + verification state + platform alignment already evaluated. 30 seconds to orient.
Multiply across hundreds of findings per quarter and the triage-time savings outweigh the cost of the subscription. This is the kind of small-optimization-that-compounds most AI pentest platforms undervalue.
Attack Chains
Integration with attack chains
Exploit-DB matches feed the attack-chain synthesiser. "Info disclosure leaks software version → rule-based chain fires with EDB top match → chain severity bumps based on exploit availability". The chain's combined_impact string references the specific EDB ID and exploit type:
Apache info-leak exposed version 2.4.49 → EDB-51234 (verified, remote, 2021) is a drop-in path-traversal-to-RCE exploit → if the deployed server hasn't been patched since 2021, this chain reaches RCE.
Specific. Cited. Testable.
Watch Out
Caveats
Two things to keep in mind:
- **An EDB entry is not proof of vulnerability.*It's proof that someone once had a working exploit against a version that may or may not match your exact config. Always confirm with the PoC before paging on-call.
- **Not all CVEs have EDB entries.*Especially newer CVEs or vendor-disclosure-only issues. Absence of an EDB hit doesn't mean you're safe — it just means a public PoC hasn't been published (yet).
Pentestas's proof-of-exploit model is always primary. EDB ranking is orientation / context, not replacement.
See Exploit-DB ranking in your scan results
Every finding in every Pentestas scan includes ranked EDB candidates. Included in all paid plans.
Start your AI pentestMore Reading
Further reading
- Exploit-DB matches docs
- Attack chain synthesis
- Network scan — where most CVE-exact hits come from

Alexander Sverdlov
Founder of Pentestas. Author of 2 information security books, cybersecurity speaker at the largest cybersecurity conferences in Asia and a United Nations conference panelist. Former Microsoft security consulting team member, external cybersecurity consultant at the Emirates Nuclear Energy Corporation.