TRIS Lab · Interactive · Free

Score any vulnerability.
Watch CVSS get it wrong.

Pick a famous CVE or build your own scenario. TRIS v2 scores it across all 12 layers in real time. Watch the score diverge from CVSS as you add context. The part your scanner is missing.

12
Layers
5
Novel Dimensions
Live
Rescoring
Zero
Account Required
TRIS v2 Score
0
/ 100
Pick a scenario
Copied to clipboard Paste with Cmd+V in the LinkedIn box
3,847 vulnerabilities scored today · Live across all sessions
The Inversion · CVSS vs TRIS v2 Disagree
CVSS says 9.8 fix first. TRIS v2 says 34 fix last. This is the kind of scoring inversion your scanner is missing.
Score Delta
64
Start With a Famous CVE
Click any card · inputs populate automatically
Foundational Signals
Layers 1 to 3
CVSS Base Score 10.0
Technical severity from NVD. 0 is none, 10 is maximum theoretical impact.
EPSS Probability 0.97
FIRST.org exploitation prediction. Probability of exploitation in next 30 days.
CISA KEV Status
Confirmed active exploitation in the wild. Binary signal.
Contextual Signals
Layers 4 to 7
Threat Actor Targeting
Is a known APT group actively using this CVE against your sector?
Asset Criticality
The business importance of the affected asset.
Public Exposure
Network exposure of the affected asset.
BASzy Exploit Validation
Does the attack actually work against your environment right now?
Novel v2 Layers · Patent Pending
Layers 8 to 12
Attack Path Blast Radius 85
Number of downstream assets reachable through lateral movement from the compromised host.
Supply Chain Depth
How deep in your dependency tree does the vulnerable component sit?
Defense Efficacy (ATT&CK coverage) 22%
Percentage of the exploitation chain ATT&CK techniques your controls actually cover.
Threat Trajectory
Is exploit activity increasing, stable, or decreasing week over week?
Expected Financial Impact $2.4M
FAIR-based expected loss including primary, secondary, and productivity impact.
Industry Context
Premium
Your Industry
Healthcare
Financial Services
Critical Infrastructure
Federal / DoD

Industry-Specific Threat Modeling

Sector targeting multipliers, compliance weightings, and industry-specific APT pressure are tuned per vertical in the full platform. Healthcare is not the same threat landscape as fintech or federal.

Unlock via Demo
Compliance Requirements
Premium
Regulatory Frameworks
HIPAA
PCI DSS
SOC 2
FedRAMP

Compliance-Weighted Scoring

Your regulatory obligations change the economics of every CVE. A CVSS 7.5 in a HIPAA-governed system is not the same risk as the same CVE in an uncontrolled environment. CVEasy maps to seven major frameworks.

Unlock via Demo
Your Actual Network Topology
Premium

Score Against Your Real Data

The full CVEasy AI platform runs this same scoring engine against your actual asset inventory, network topology, and SBOM. Attack paths are computed from your real graph. Financial impact uses your real revenue baseline. Everything local. Nothing leaves your network.

Request a 30-min Demo
Live Comparison
CVSS Verdict
10.0
Fix first
TRIS v2 Verdict
94
Fix first

CVSS and TRIS v2 agree. Active exploitation with crown-jewel exposure, accelerating trajectory, and high financial impact. This is a real fire.

12-Layer Contribution
1
2
3
4
5
6
7
8
9
10
11
12
Did You Know

The Numbers Behind Why CVSS Is Failing You.

These aren't CVEasy marketing stats. Every number below is publicly sourced and verifiable. If you're running CVSS-only triage, you're working on the wrong backlog.

57%
Of CVEs score 7.0 or higher on CVSS. The majority of your catalog looks critical if you trust severity alone.
2.3%
Of published CVEs are ever actually exploited in the wild. Your team is working on the wrong 54%.
47
Days. The median gap between CVE disclosure and active exploitation. Quarterly patch cycles were designed for an era that no longer exists.
$4.88M
Average breach cost in 2024 per IBM. CVSS gives you a 0-to-10 score. Your board wants a dollar figure.
73%
Of critical CVSS scores (9.0+) have no known exploit in the wild at disclosure. You're patching fire drills that never burn.
14
Days. The CISA KEV patch mandate for federal agencies. Private sector should treat it with the same urgency.
60%
Of breaches exploit vulnerabilities rated High or Medium, not Critical. Severity is not risk.
0
Other scoring systems combine all 12 TRIS v2 layers. This is the part that makes the tool you just used impossible to reproduce.
Free Report · No Demo Required

Get a PDF report of this exact scoring analysis.

Email me a branded PDF of the current TRIS v2 breakdown with all 12 layer contributions, the insight, the CVSS comparison, and the shareable summary. No demo call required. No credit card. Just a PDF you can forward to your team.

We respect your inbox. One PDF. No drip campaign. Unsubscribe is a human reply, not a dark pattern.
Sent. Check your inbox in about 2 minutes.
Patent Pending
12-layer methodology
Shipping in v1.1
CVEasy AI production
Built by Analysts
Not cloud vendors
12 Layers
5 novel, 7 foundational
Local-First
Zero cloud inference

Your Result.
Ready to share.

Screenshot the card below and drop it into LinkedIn, Twitter, Slack, or anywhere else. The summary text updates as you change inputs. Copy it, paste it, tag a friend who still runs CVSS-only triage.

Methodology Reference

How TRIS v2 actually scores a vulnerability.

Everything above this section is interactive. Everything below is the plain-English explanation of how the scoring engine works, what each of the twelve layers measures, and why we weighted them the way we did. Read it if you want the methodology. Skip it if you came for the tool.

The twelve layers, in one sentence each

TRIS v2 organizes its scoring into three tiers: foundational signals (Layers 1 through 3), contextual signals (Layers 4 through 7), and the five novel dimensions (Layers 8 through 12) that separate TRIS v2 from every competitor.

L1 CVSS Base Score

The foundational technical severity score from NVD. TRIS v2 uses it as a baseline but deliberately weights it lower than most scoring systems so it does not dominate the composite. A CVSS 9.8 and a CVSS 7.5 can land within a few points of each other when the other eleven layers disagree.

L2 EPSS Weaponization Probability

FIRST.org's Exploit Prediction Scoring System estimates the probability that a vulnerability will be exploited in the wild within 30 days. TRIS v2 heavily weights this signal because it reflects real-world attacker economics, not theoretical severity.

L3 CISA KEV Active Exploitation

CISA's Known Exploited Vulnerabilities catalog is the definitive "this is being used right now" signal. Any CVE on the KEV list triggers a hard override boost. CISA mandates federal agencies patch KEV entries within 14 days.

L4 Threat Actor Targeting

TRIS v2 tracks 49+ named APT groups, their known toolkits, their TTPs, and the industries they target. When APT29 is known to use a specific CVE and your organization is in their target sector, this layer significantly boosts the score. Your threat landscape, not a generic one.

L5 Asset Criticality

A vulnerability on a development laptop is not the same risk as the same vulnerability on a production database or domain controller. TRIS v2 auto-classifies assets by role and business criticality and applies a criticality coefficient. Crown-jewel assets receive maximum weight.

L6 Public Exposure Topology

Internet-facing assets with exploitable services are categorically more urgent than internal-only assets with the same CVE. TRIS v2 factors in whether the affected asset is publicly reachable, which ports are exposed, and whether the vulnerable service is actually running on those ports.

L7 BASzy Exploit Validation

TRIS v2 runs real attack simulations against your environment using 12,868 BASzy payloads and records whether the exploit actually works in your specific configuration. A theoretically-critical CVE blocked by your WAF or EDR gets a reduction. A mid-severity CVE that BASzy proves is exploitable with no detection gets a major boost.

L8 Attack Path Blast Radius · Novel in v2

Graph-based lateral movement modeling. TRIS v2 models your network as a directed graph and quantifies how many assets a vulnerability can reach through lateral movement, how many distinct pivot paths exist to reach crown-jewel systems, and how close the affected asset sits to Tier 1 assets. No competitor offers this. Most treat all assets as topologically equivalent.

L9 Supply Chain Dependency Propagation · Novel in v2

SBOM-aware transitive risk scoring. TRIS v2 ingests your software bill of materials and quantifies how deep a vulnerability sits in your dependency tree, how many applications are transitively affected, and whether a fixed version exists. Log4Shell, modeled correctly. Zero competitor coverage.

L10 Defense Efficacy Coefficient · Novel in v2

Continuous control validation, inverted. TRIS v2 maps exploitation chains to MITRE ATT&CK techniques and scores the percentage of those techniques covered by your organization's actual defenses, freshness-weighted by BAS validation age. Asks the question no other scoring system asks: how well defended are we against this specific attack sequence?

L11 Predictive Threat Trajectory · Novel in v2

Forward-looking momentum forecast. Tracks week-over-week changes in exploit development, dark-web chatter, public PoC commit velocity, and fork activity on known exploit repositories. Identifies fast-movers accelerating from proof-of-concept to weaponized before they hit the KEV catalog.

L12 Financial Impact Quantification · Novel in v2

FAIR-based dollar-value risk. TRIS v2 bridges security and finance by translating technical severity into expected monetary loss: primary loss (incident response, forensics, containment), secondary loss (regulatory fines under GDPR, HIPAA, PCI, notification costs, legal exposure), and productivity loss (downtime cost against your measured per-hour revenue).

Why the curve is non-linear

The raw weighted sum of all twelve layers is passed through a diminishing-returns function before being normalized to a 0-100 score. This matters because linear scoring systems suffer from severity compression: half your catalog ends up clustered between 75 and 100 with no meaningful separation. TRIS v2 uses an exponential saturation curve that creates real separation between "critical" and "merely important" vulnerabilities. The practical ceiling is 94, which is only reachable with extreme signals across all twelve layers.

Why the bands are what they are

Five priority bands. ACT (90 to 100): immediate action, drop what you're doing, sub-24-hour SLA. ATTEND (75 to 89): same-week remediation, sprint commitment. TRACK (50 to 74): scheduled patching cycle, SLA-bounded. MONITOR (25 to 49): watch for trajectory change. INFORMATIONAL (0 to 24): document and move on. The cutoffs are deliberately asymmetric so ACT is rare, INFORMATIONAL is common, and everything meaningful lives in the middle three bands.

What this tool cannot show you

The free TRIS Lab above runs a simplified version of the scoring engine client-side in your browser. The production CVEasy AI platform runs the full engine against your actual data. Three critical capabilities are gated behind a demo request because they require your real environment: industry-specific threat modeling (sector multipliers), compliance-weighted scoring (HIPAA, PCI, SOC 2, FedRAMP), and your real network topology and SBOM for Layers 5, 8, and 9. If you want to see TRIS v2 running against your actual scan data, request a 30-minute demo. Your data stays entirely in your environment.

Related reading

19 Presets · L LinkedIn · T Tweet · I Image · C Copy · ? Help