Milestones

How our detection approach holds up as CVE enrichment changes

Publisher
Pentest-Tools.com
Updated at

If you've been following the offensive security tooling space, you may have seen NIST's recent update on NVD operations and the broader discussion around CVE enrichment gaps. Here's what it means in practice - and what it means for your results in Pentest-Tools.com.

What's changing in the ecosystem

Passive, version-based detection is a component of most vulnerability scanners: they identify a software version, match it to a CVE ID, and flag it as a finding. That layer depends on CVEs receiving complete enrichment data (including Official Common Platform Enumeration identifiers) from NIST and CISA. When that enrichment is delayed or missing, passive detections become less reliable.

This is a real constraint - and it affects the entire ecosystem and every vendor in the passive detection layer (us included). That’s why we’ve been building towards a more resilient detection mechanism that keeps testing methodologies as close as possible to the reality security practitioners experience every day.

Where our approach is different

Because offsec testing accuracy is core to what we do, we've built detection across multiple methods rather than relying on a single source of truth.

Our Network Scanner combines passive version-based detection with active validation - checks that probe the actual behavior of a service rather than just its reported version. 

Active detections don't depend on CVE enrichment to fire correctly. They test the real condition. For critical CVEs, Sniper Auto-Exploiter goes further: it attempts actual exploitation on authorized targets and extracts proof of exploitability, independent of whether the underlying CVE has complete metadata.

Our Website Scanner takes a different path entirely: it detects web vulnerabilities - SQLi, XSS, SSRF, XXE, and more from the OWASP Top 10 - through active testing rather than CVE matching. Enrichment gaps don’t affect this layer at all.

What this means for your work

Your scan results remain reliable and evidence-backed. 

Findings from active checks come with proof - not just a version match - which makes them more defensible in reports and easier to prioritize.

If you're currently on a plan that includes the Network Scanner's active detection, Sniper, or the Website Scanner, this resilience is already working for you. 

If you’re on the Free edition, it’s worth taking a look at the active scanning and authenticated scanning capabilities you can unlock with one of our paid plans. Since these methods are the least affected by CVE enrichment gaps, upgrading is how you get the coverage described above.

We'll continue being transparent about what each detection method can and can't validate - that's not changing.

Get vulnerability research & write-ups

In your inbox. (No fluff. Actionable stuff only.)

Footer

© 2013-2026 Pentest-Tools.com

Pentest-Tools.com has a LinkedIn account it's very active on

Join over 45,000 security specialists to discuss career challenges, get pentesting guides and tips, and learn from your peers. Follow us on LinkedIn!

Pentest-Tools.com has a YouTube account where you can find tutorials and useful videos

Expert pentesters share their best tips on our Youtube channel. Subscribe to get practical penetration testing tutorials and demos to build your own PoCs!

G2 award badge

Pentest-Tools.com recognized as a Leader in G2’s Spring 2023 Grid® Report for Penetration Testing Software. Discover why security and IT pros worldwide use the platform to streamline their penetration and security testing workflow.

OWASP logo

Pentest-Tools.com is a Corporate Member of OWASP (The Open Web Application Security Project). We share their mission to use, strengthen, and advocate for secure coding standards into every piece of software we develop.