VULNINDEX

VULNINDEX

VULNINDEX

VULNINDEX

CYBERSECURITY KNOWLEDGE BASE

CYBERSECURITY KNOWLEDGE BASE

CYBERSECURITY KNOWLEDGE BASE

2025

2025

2025

Visit Site

Visit Site

Visit Site

Cybersecurity

Database

SaaS

my role

UI/UX Designer

timeline

2 Months

Responsibilities

UX Research

Information Architecture

Visual Design

Overview

“VulnIndex” is a specialised web platform designed to aggregate and simplify software vulnerability data. Combining features for real-time CVE searching, severity risk assessment, detailed security documentation, and threat monitoring, it offers a streamlined approach to cybersecurity research. With this tool, users can not only quickly locate critical technical details but also efficiently analyse security risks. Thanks to its structured and data-centric design, 'VulnIndex' makes complex vulnerability tracking accessible and convenient for professionals.

Table close-up

Table

close-up

Table

close-up

VulnIndex

VulnIndex

VulnIndex

Logo

Logo

INITIAL CHALLENGES

Designing the interface for VulnIndex presented extreme data-density challenges. The core hurdle was structuring a massive, 12-column data grid that could simultaneously display lengthy, unpredictable text (like report titles) alongside concise, highly specific metadata. Balancing this high data density with immediate readability was crucial to prevent cognitive overload. To solve this, I designed a highly scannable, color-coded pill system that instantly communicates critical variables like Severity and PoC Availability without cluttering the primary workspace. Furthermore, maintaining usability on smaller screens demanded creative responsive design solutions for horizontal data tables - ensuring analysts never lose context while scrolling through dense technical information.

RESEARCH &
brand immersion

I immersed myself in the daily workflows of cybersecurity professionals, auditing existing vulnerability databases to analyze how legacy platforms fail at handling high-volume technical text. This insight drove the design of the prominent, multi-parameter filtering bar, allowing users to drill down by Language, Technology, Root Cause, and CWE. User research also highlighted a critical pain point: visual fatigue from parsing wall-to-wall data. This directly informed our dark-theme UI. Finally, to align with the brand's core promise - "The Shortcut To Security Knowledge" - the visual identity pairs crisp typography with a subtle architectural grid to convey the technical rigor of a modern, high-precision developer tool.

user persona

32 y.o.

San Francisco, USA

San Francisco, USA

Bug Bounty Hunter

Bug Bounty Hunter

Single

M.S. in Computer Science

FRUSTRATION

Struggles with search tools that fail to accurately query specific lines of code, raw HTTP headers, or exact JSON parameters without breaking the syntax.

The most valuable write-ups are buried deep within HackerOne/Bugcrowd activity feeds or obscure personal blogs, lacking a unified search interface.

Sifting through hundreds of repetitive, low-quality, or AI-generated blog posts just to find one unique payload or valid Proof of Concept (PoC).

GOALS

Search complex data for highly specific, niche exploit chains and code snippets rather than reading generic, high-level CVE descriptions.

Monitor recently published write-ups to spot trending attack surfaces or newly discovered vulnerable software stacks across different target companies.

Quickly surface historical reports to see how other hackers bypassed similar security filters (e.g., WAF evasion techniques or specific parameter tampering).

Time is money in bug bounty, and right now, I lose hours just hunting down old write-ups instead of actually hunting bugs. I don't get paid to read PR spin, vendor advisories, or high-level CVE summaries. I need a search engine that actually understands what a raw HTTP request looks like - a place where I can drop in a specific parameter or a chunk of code and instantly pull up every historical bypass and PoC across HackerOne, Bugcrowd, and random personal blogs. If a brilliant researcher took their site offline two years ago, I still need to see that payload.

KEY LEARNINGS

ARCHITECTING

HIGH-DENSITY INTERFACES

ARCHITECTING

HIGH-DENSITY

INTERFACES

ARCHITECTING HIGH-DENSITY

INTERFACES

Managing a 12-column data grid requires a rigorous “Signal-to-Noise” hierarchy. For expert-level tools, information density is a requirement, not a drawback. Prioritising critical metadata - such as Severity levels and PoC availability - ensures researchers can parse massive datasets instantly, eliminating the cognitive fatigue often associated with complex security databases.

PRECISION-DRIVEN

FILTERING

Transitioning from basic dropdowns to a unified “Filter Engine” modal aligns the UI with the logic of a complex technical query. Providing granular control over niche parameters, such as specific JSON payloads and code snippets, transforms a passive database into a high-performance tool built for the specific mental models of power users.

OPTIMIsING

TIME-TO-INSIGHT

The utility of a cybersecurity platform is measured by the speed of discovery. Consolidating fragmented data sources - ranging from obscure personal blogs to Bugcrowd activity feeds - into a single actionable view eliminates manual “hunt time.” The UX focuses on turning raw data into active threat intelligence, directly supporting high-stakes, rapid-response workflows.

LET’S TALK

LET’S TALK

LET’S TALK

LET’S TALK

and create something interesting!

and create something interesting!

and create something interesting!

©2026 Anastasiia Nazarova. All rights reserved.

©2026 Anastasiia Nazarova.

All rights reserved.

©2026 Anastasiia Nazarova.

All rights reserved.

©2026 Anastasiia Nazarova. All rights reserved.

To the Top

Create a free website with Framer, the website builder loved by startups, designers and agencies.