While conducting a penetration test, you find that a critical application used by the target organization is susceptible to a recently discovered vulnerability. You need to find a proof-of-concept exploit to test the system's defenses against this vulnerability. Which of the following resources is most appropriate for locating the specific exploit code?
Packet Storm
Official CVE website
Vendor's security bulletin
Common Vulnerability Scoring System (CVSS) database