While conducting a penetration test, you find that a critical application used by the target organization is susceptible to a recently discovered vulnerability. You need to find a proof-of-concept exploit to test the system's defenses against this vulnerability. Which of the following resources is most appropriate for locating the specific exploit code?
Vendor's security bulletin
Packet Storm
Official CVE website
Common Vulnerability Scoring System (CVSS) database