I built CVE Daily to cut CVE triage time. It pulls from NVD and OSV, puts vendor advisories up front, and adds short guidance on what to patch or mitigate now. There’s also a Transitive Upgrade Assistant that uses deps.dev graphs to suggest the minimum safe host version when a vulnerable dependency is pulled in transitively.
Highlights:
NVD + OSV aggregation
Vendor advisories first
Concise, neutral “what to do now”
KEV badges and prioritization notes
Tags/filters (vendor, product, CWE)
EOL/EOS context for impacted products
Would love feedback from SecEng/SRE/IT admins: If this helps, share it with your team; if not, tell me why.