| Aikido Security | Aikido Security Platform | https://help.aikido.dev/code-scanning/miscellaneous/use-epss-values-to-further-reduce-noise |
| AppSoc | Risk-Based Application Security Posture Management | https://www.appsoc.com/ |
| Aqua Security | Aqua Workload Protection | https://support.aquasec.com/support/solutions/articles/16000166626-2023-september-saas-update-release%23EPSS-(Exploit-Prediction-Scorin |
| Armis | Armis Asset Vulnerability Management module | https://www.armis.com/integrations/exploit-prediction-scoring-system-epss/ |
| Armo Security | Armo Kubernetes Security | https://hub.armosec.io/docs/vulnerabilities-workloads |
| Armorcode | Risk-Based Vulnerability Management | https://www.armorcode.com/blog/epss-and-risk-based-vulnerability-prioritization |
| Arnica | Pipelineless Application Security | https://docs.arnica.io/arnica-documentation/code-risks/software-composition-analysis-sca#exploit-prediction-scoring-system-epss-score-and-trend |
| Avalor | Avalor Security Data Fabric | https://www.avalor.io/integrations |
| AWS | Inspector | https://aws.amazon.com/about-aws/whats-new/2023/07/amazon-inspector-vulnerability-intelligence-findings/ |
| Axonius | Vulnerability Management Module | https://docs.axonius.com/docs/vulnerabilities |
| Axxemble | BaseFortify | https://basefortify.eu/posts/2025/01/epss:_prioritizing_vulnerabilities_based_on_exploit_likelihood.html |
| Backlash | Reachability SAST/SCA | https://www.backslash.security/ |
| Balbix | Risk-Based Vulnerability Management | https://www.balbix.com/product/risk-based-vulnerability-management/ |
| Binarly | Transparency Platform | https://binarly.io/capabilities |
| Black Kite | Third Party & Cyber Risk Management Platform | https://content.blackkite.com/ebook/2025-supply-chain-vulnerability-report/ |
| Bomber | Bomber | https://github.com/devops-kung-fu/bomber |
| Brinqa | Cyber Risk Platform | https://www.brinqa.com/glossary/what-is-epss-score/ |
| Boost Security | DevSecOps Platform | https://docs.boostsecurity.io/user-guide/new_release.html#2023-03-09 |
| Cavelo | Attack Surface Management | https://www.cavelo.com |
| CIRCL | Vulnerability Lookup | https://vulnerability.circl.lu |
| cvefeed.io | Vulnerability Intelligence | https://cvefeed.io |
| Cisco | Cisco Vulnerability Management | EPSS and Its Role in Cisco Vulnerability Management Risk Scoring |
| Clavis | Risk-Based Vulnerability Priorization | https://produto.clavis.com.br/material-bart-gerenciamento-de-vulnerabilidade-baselines-analises-de-risco-testes-de-seguranca/ |
| Cytidel | vulnerability and risk management platform | https://www.cytidel.com/ |
| Claroty | vulnerability and Risk Management | https://claroty.com/press-releases/claroty-unveils-new-vulnerability-risk-management-capabilities-to-supercharge-risk-reduction-for-cyber-physical-systems |
| Cloudsmith | Cloud Native Artifact Management Platform | https://cloudsmith.com/blog/cloudsmith-introduces-epss-scoring-in-enterprise-policy-management-epm |
| Coalition | Coalition Exploit Scoring System | https://ess.coalitioninc.com/ |
| ConnectSecure | ConnectSecure Vulnerability Management | https://connectsecure.com/news/product-update-epss-empowers-msps-to-tackle-high-risk-vulnerabilities |
| Cowbell | Cowbell Insurance | https://cowbell.insure/ |
| Culinda | Culinda Cloud Security | https://www.culinda.io/ |
| CTM360 | Threat Cover | https://www.ctm360.com/ |
| CVE Crowd | CVEs discussed on the Fediverse | https://cvecrowd.com/ |
| Cybeats | SBOM Studio | https://www.cybeats.com/sbom-studio |
| CybelAngel | Asset Discovery & Monitoring | https://cybelangel.com/asset-discovery-and-monitoring/ |
| Cyberwatch | Cyberwatch Vulnerability Management | https://cyberwatch.fr/veille/epss-quest-ce-que-lexploit-prediction-scoring-system/ |
| Cyscale | Cloud Security Platform | https://cyscale.com/blog/security-scoring-cvss4-vs-cvss3-need-to-know/ |
| Datadog | Application Vulnerability Management | https://www.datadoghq.com/product/application-vulnerability-management/ |
| Dazz | Dazz Unified Remediation Platform | https://www.dazz.io/platform |
| Deepfactor | Application Security Platform | https://www.deepfactor.io/deepfactor-3-5-includes-enhanced-vulnerability-prioritization-with-epss-support-and-reachability-analysis-for-golang/ |
| Denexus | OT Cyber Risk Quantification | https://www.denexus.io/products/derisk/industrial |
| DevOcean | Low-Touch Remediation Platform | https://www.devocean.security/blog/epss-everything-you-need-to-know |
| Docker Scout | Solution for proactively enhancing your software supply chain security | https://www.docker.com/products/docker-scout/ |
| EdgeBit | EdgeBit Security Platform | https://edgebit.io/docs/0.x/investigate-epss/ |
| Edgescan | Risk-Based Vulnerability Management Solution | https://www.edgescan.com/solutions/vulnerability-management/ |
| Elastic | Elastic Seach Platform | https://www.elastic.co/docs/current/integrations/first_epss |
| Endor Labs | Endor Labs | https://www.endorlabs.com/blog/cve-vulnerability-epss-ssvc-reachability-vex |
| FOSSA | The Modern Open Source Risk Platform | https://fossa.com/blog/understanding-using-epss-scoring-system/ |
| Flashpoint | Flashpoint VulnDB | https://flashpoint.io/resources/datasheets/vulndb-ransomware-and-exploit-prediction-model/ |
| Fleet | Open-source device management | https://fleetdm.com/upgrade |
| Fluid Attacks | Fluid Attacks | https://fluidattacks.com/ |
| ForeScout | Risk and Exposure Management | https://www.forescout.com/products/rem/ |
| Fortinet | Forinet DAST | https://docs.fortinet.com/document/fortidast/23.3.0/user-guide/476620/vulnerabilities |
| FortMesa | Riskchain VM | https://land.fortmesa.com/vulnerability-management-101 |
| Finite State | Finite State Platform | https://finitestate.io/products/finite-state-platform/ |
| GitHub | Dependabot | https://docs.github.com/en/code-security/dependabot/dependabot-alerts/viewing-and-updating-dependabot-alerts |
| Github Advisory Database | GHSA | https://github.blog/changelog/2024-10-10-epss-scores-in-the-github-advisory-database/ |
| HackerOne | CVE Discovery | https://hackerone.com/hacktivity/cve_discovery |
| Hackuity | Risk-Based Vulnerability Management | https://www.hackuity.io/ |
| Harness | Security Test Orchestration | https://www.harness.io/products/security-testing-orchestration |
| IBM | Concert | https://www.ibm.com/docs/en/concert?topic=dimension-understanding-concert-risk-score-vulnerabilities#understanding_the_concert_risk_score__title__4 |
| Interlynk | Software Supply Chain Security | https://docs.interlynk.io/product-guides/interlynk-basics/vulnerability |
| Intruder | Exposure Management Platform | https://www.intruder.io/ |
| Iru | Vulnerability Management | https://docs.iru.com/en/endpoint/vulnerability-management/vulnerability-management-overview |
| Kerzinger | VulnDex | https://vulndex.at/ |
| Keysight | Keysight IoT Security Assessment | https://www.keysight.com/be/en/products/network-security/iot-security-assessment.html |
| Kodem | Kodem Security | https://www.kodemsecurity.com/ |
| Kondukto | Kondukto ASPM Platform | https://kondukto.io/ |
| Lansweeper | Lansweeper Asset Intelligence | https://community.lansweeper.com/t5/cyber-security-and-risk-insights/understanding-exploitability-fields/ta-p/77274 |
| Legit Security | Legit Supply Chain Security | https://www.legitsecurity.com/ |
| Luna Sec | Luna Sec | https://www.lunasec.io/docs/blog/what-is-epss/ |
| Manifest | Manifest | https://www.manifestcyber.com/blog/introducing-manifest |
| Mandiant | Mandiant Vulnerability Intelligence | https://www.mandiant.com/resources/blog/enhanced-vulnerability-intelligence |
| Mend.io | Mend | https://docs.mend.io/bundle/sca_user_guide/page/view_epss_scores_for_container_images.html |
| Microsoft | Microsoft Defender | https://techcommunity.microsoft.com/t5/microsoft-defender-vulnerability/enhancing-vulnerability-prioritization-with-asset-context-and/ba-p/4212480 |
| Mondoo | Unified Security Posture Management | https://mondoo.com/docs/platform/security/posture/vulnerabilities/#epss-score |
| Morphisec | Morphisec Vulnerability Management | https://blog.morphisec.com/morphisec-next-gen-risk-based-vulnerability-prioritization |
| Nanitor | Nanitor CTEM Platform | https://help.nanitor.com/134-epss/ |
| Netrise | Netrise Platform | https://www.netrise.io/xiot-security-blog/sbom-ingest |
| NetSPI | Attack Surface Management (ASM) | https://www.netspi.com |
| Noetic | Noetic Platform | https://noeticcyber.com/risk-driven-vulnerability-prioritization/ |
| Nucleus Security | Nucleus Unified Vulnerability Management | https://nucleussec.com/blog/what-is-epss/ |
| NTT DATA | YaVS / SecDB Portal | https://secdb.nttzen.cloud |
| Oligo | Dynamic SCA | https://www.oligo.security/ |
| Opswright | Opswright Impact Platform | https://opswright.com/ |
| Orca | Cloud Security Platform | https://orca.security/resources/blog/epss-scoring-system-explained/ |
| OX Security | OX Security Platform | https://www.ox.security/ |
| Oryx Labs | Attack Surface Management | https://oryxlabs.ae/ |
| OWASP | Dependency Track | https://owasp.org/www-project/dependency-track |
| Palo Alto Network | Prisma Cloud | https://www.paloaltonetworks.com/prisma/cloud |
| Palo Alto Network | Xpanse | https://www.paloaltonetworks.com/blog/security-operations/enable-proactive-incident-response-with-adaptive-risk-scoring/ |
| Phoenix Security | Act on Phoenix | https://phoenix.security/new-features-november-2022/ |
| Plexicus | AI-powered CNAPP | https://www.plexicus.ai/ |
| Precursor | Penetration Testing and Continuous Security Testing Services | https://www.precursorsecurity.com/ |
| Procapsuite | Procap 360 | https://procapsuite.com/ |
| UpGuard | UpGuard Platform | https://help.upguard.com/en/articles/9180433-what-is-exploit-prediction-scoring-system-epss |
| Qualys | TruRisk | https://blog.qualys.com/qualys-insights/2022/10/10/in-depth-look-into-data-driven-science-behind-qualys-trurisk |
| Rapid7 | Surface Command & Exposure Command | https://docs.rapid7.com/surface-command-offering/quick-start-guide/#phase-1-get-up-and-running |
| Rezilion | Rezilion | https://www.rezilion.com/blog/introducing-our-new-software-supply-chain-security-features/ |
| runZero | EPSS-Pulse | https://www.runzero.com/epss-pulse/ |
| SecLogic | CyberQ Shield | https://seclogic.io/ |
| SecOps Solution | Full-Stack Vulnerability and Patch Management Platform | https://secopsolution.com/epss-calculator |
| Securin | Vulnerability Intelligence | https://www.securin.io/vulnerability-intelligence/ |
| SecurityScorecard | CVE Details | https://www.cvedetails.com/epss/epss-score-history.html |
| Seemplicity | Seemplicity | https://seemplicity.io/different-approaches-for-vulnerability-prioritization/ |
| Semgrep | Semgrep AppSec Platform | https://semgrep.dev/ |
| SentinelOne | SentinelOne Vulnerability Management | https://www.sentinelone.com/platform/singularity-ranger-insights/ |
| ServiceNow | ServiceNow Vulnerability Response | https://docs.servicenow.com/bundle/vancouver-security-management/page/product/secops-integration-vr/epss/concept/epss-vr-integration-overview.html |
| Shield Cyber | Attacker-centric Exposure Management | https://www.shieldcyber.io/ |
| Shodan | CVEDB API | https://cvedb.shodan.io/ |
| SideChannel | Enclave | https://sidechannel.com/blog/enhance-your-security-measures-with-effective-epss-and-exposure-management/ |
| Skybox | Vulnerability & Threat Management | https://www.skyboxsecurity.com/products/vulnerability-control/ |
| Snyk | Security Intelligence | https://snyk.io/blog/improved-risk-assessment-with-epss-scores-in-snyk/ |
| SOCRadar | Extended Threat Intelligence | https://socradar.io/predicting-vulnerability-exploitation-for-proactive-cybersecurity-whats-epss-and-how-can-svrs-enhance-it/ |
| SOOS | SOOS Security | https://kb.soos.io/help/exploitable-vulnerabilities |
| SPDX | The Software Package Data Exchange (SPDX) | https://spdx.dev/capturing-software-vulnerability-data-in-spdx-3-0/ |
| Stackaware | AI Risk Management | https://stackaware.com/ |
| Strobes | VM365 | https://help.strobes.co/hc/en-us/articles/13158942134801-Vulnerabilities-Custom-CSV-Export |
| Tanium | Tanium Comply | https://help.tanium.com/bundle/WhatsNewComplyAug/page/ANN/WhatsNewComplyAug/WhatsNewComplyAug.htm |
| Tenable | Tenable Vulnerability Management | https://docs.tenable.com/vulnerability-management/Content/vulnerability-intelligence/vulnerability-information.htm |
| Ultrared | Ultrared Threat Exposure Management | https://www.ultrared.ai/blog/epss-and-exposure-management |
| Uptycs | The first unified CNAPP and XDR platform | https://www.uptycs.com/products/why-uptycs |
| Veracode | Veracode SCA | https://docs.veracode.com/r/Understanding_SCA_exploitability_information |
| Verve | Verve Security Center | https://verveindustrial.com/resources/blog/calculated-risk-rating-data-driven-ot-risk-assessment/ |
| Vulcan | Vulcan Cyber Risk Management Platform | https://vulcan.io/blog/thinking-of-using-epss-heres-what-you-need-to-know/ |
| VulDB | Cyber Threat Intelligence | https://vuldb.com/?kb.epss |
| Vulmon Search | Vulnerability Intelligence Search Engine | https://vulmon.com |
| VulnCheck | VulnCheck Exploit & Vulnerability Intelligence | https://vulncheck.com/product/exploit-intelligence |
| Vulners | Vulners Database | https://vulners.com/search |
| Wiz | Wiz Platform | https://www.wiz.io/ |
| Würth Phoenix | SATAYO CTI Platform | https://www.neteye-blog.com/2023/12/epss-implementation-in-satayo/ |
| Xygeni Security | All-in-One Application Security Platform | https://docs.xygeni.io/introduction-to-xygeni/prioritization-funnels/prioritization-funnels-1/exploitability#exploitability |
| Yes We Hack | Bug Bounty & Vulnerability Management Platform | https://www.yeswehack.com/ |