You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: cvss/CVSS/index.html
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -1420,7 +1420,7 @@ <h1 id="common-vulnerability-scoring-system-cvss">Common Vulnerability Scoring S
1420
1420
<li><abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Severity Rating</li>
1421
1421
<li><abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Confidentiality, Integrity, Availability Impacts</li>
<h2id="cvss-severity-rating-scale"><abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Severity Rating Scale<aclass="headerlink" href="#cvss-severity-rating-scale" title="Permanent link">¶</a></h2>
<li>See <ahref="https://github.com/epss-sig/epss-interoperability">https://github.com/epss-sig/epss-interoperability</a> TODO
1532
-
for the code<ol>
1531
+
<li>
1532
+
<p><imgalt="🧑💻" class="twemoji" src="https://cdn.jsdelivr.net/gh/jdecked/twemoji@15.0.3/assets/svg/1f9d1-200d-1f4bb.svg" title=":technologist:" /> See <ahref="https://github.com/RiskBasedPrioritization/RiskBasedPrioritizationAnalysis/">Source Code</a> for the code</p>
1533
+
<ol>
1533
1534
<li>This includes the data used in the analysis (downloaded
<p>See <ahref="https://github.com/RiskBasedPrioritization/RiskBasedPrioritizationAnalysis/analysis">analysis</a> directory for these files.</p>
1647
+
<p>See <ahref="https://github.com/RiskBasedPrioritization/RiskBasedPrioritizationAnalysis/tree/main/analysis">analysis</a> directory for these files.</p>
<li>Take the data sources from <ahref="https://github.com/RiskBasedPrioritization/RiskBasedPrioritizationAnalysis/tree/main/data_in/">data_in/</a></li>
1651
1651
<li>Enrich the <abbrtitle="CVE Common Vulnerability and Exposures. A standardized list of publicly known vulnerabilities and exposures maintained by the MITRE Corporation.">CVE</abbr> data from <abbrtitle="National Vulnerability Database">NVD</abbr> with the other data sources</li>
1652
1652
<li>Add an "Exploit" column to indicate the source of the exploitability (used later to set colors of <abbrtitle="CVE Common Vulnerability and Exposures. A standardized list of publicly known vulnerabilities and exposures maintained by the MITRE Corporation.">CVE</abbr> data in plots)</li>
1653
1653
<li>store the output in data_out/nvd_cves_v3_enriched.csv.gz</li>
<li>Read the enriched <abbrtitle="CVE Common Vulnerability and Exposures. A standardized list of publicly known vulnerabilities and exposures maintained by the MITRE Corporation.">CVE</abbr> data from data_out/CVSSData_enriched.csv.gz</li>
1658
1658
<li>Read the data from <abbrtitle="Cybersecurity & Infrastructure Security Agency">CISA</abbr><abbrtitle="Known Exploited Vulnerability">KEV</abbr> alert reports in ./data_in/cisa_kev/</li>
1659
1659
<li>Plot <abbrtitle="Cybersecurity & Infrastructure Security Agency">CISA</abbr><abbrtitle="Known Exploited Vulnerability">KEV</abbr> datasets showing <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr>, <abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> by source of the exploitability</li>
1660
1660
<li>Write data_out/cisa_kev/csa/csa.csv.gz which is the <abbrtitle="Cybersecurity & Infrastructure Security Agency">CISA</abbr><abbrtitle="Known Exploited Vulnerability">KEV</abbr> CyberSecurity Alerts (CSA) subset with <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> and other data</li>
<li>Read the enriched <abbrtitle="CVE Common Vulnerability and Exposures. A standardized list of publicly known vulnerabilities and exposures maintained by the MITRE Corporation.">CVE</abbr> data from data_out/CVSSData_enriched.csv.gz</li>
1665
1665
<li>Read the data from ./data_in/qualys</li>
1666
1666
<li>Plot Qualys dataset showing <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr>, <abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> by source of the exploitability</li>
1667
1667
<li>Write data_out/qualys/qualys.csv.gz which is the Qualys data with <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> and other data</li>
<li>Read the enriched <abbrtitle="CVE Common Vulnerability and Exposures. A standardized list of publicly known vulnerabilities and exposures maintained by the MITRE Corporation.">CVE</abbr> data from data_out/CVSSData_enriched.csv.gz</li>
1672
1672
<li>Read the data from ./data_in/msrc</li>
1673
1673
<li>Plot Microsoft Exploitability Index dataset showing <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr>, <abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> by source of the exploitability</li>
<p>See <ahref="https://github.com/RiskBasedPrioritization/RiskBasedPrioritizationAnalysis/cisa_ssvc_dt/">cisa_ssvc_dt</a> directory for these files.</p>
1679
+
<p>See <ahref="https://github.com/RiskBasedPrioritization/RiskBasedPrioritizationAnalysis/tree/main/cisa_ssvc_dt/">cisa_ssvc_dt</a> directory for these files.</p>
1680
1680
<h4id="cisa-ssvc-decision-tree-from-scratch-example-implementation"><abbrtitle="Cybersecurity & Infrastructure Security Agency">CISA</abbr><abbrtitle="SSVC Stakeholder-Specific Vulnerability Categorization">SSVC</abbr> Decision Tree From Scratch Example Implementation<aclass="headerlink" href="#cisa-ssvc-decision-tree-from-scratch-example-implementation" title="Permanent link">¶</a></h4>
<li>Read the enriched <abbrtitle="CVE Common Vulnerability and Exposures. A standardized list of publicly known vulnerabilities and exposures maintained by the MITRE Corporation.">CVE</abbr> data from data_out/CVSSData_enriched.csv.gz</li>
1684
1684
<li>Read the Decision Tree definition cisa_ssvc_dt/DT_rbp.csv</li>
@@ -1694,7 +1694,7 @@ <h4 id="cisa-ssvc-decision-tree-from-scratch-example-implementation"><abbr title
1694
1694
<li>Plot </li>
1695
1695
</ol>
1696
1696
<h4id="cisa-ssvc-decision-tree-analysis-for-feature-importance"><abbrtitle="Cybersecurity & Infrastructure Security Agency">CISA</abbr><abbrtitle="SSVC Stakeholder-Specific Vulnerability Categorization">SSVC</abbr> Decision Tree Analysis for Feature Importance<aclass="headerlink" href="#cisa-ssvc-decision-tree-analysis-for-feature-importance" title="Permanent link">¶</a></h4>
<h2id="getting-data-from-data-sources">Getting Data from Data Sources<aclass="headerlink" href="#getting-data-from-data-sources" title="Permanent link">¶</a></h2>
1706
1706
<divclass="admonition tip">
1707
1707
<pclass="admonition-title">A snapshot of the data used for this guide is available</p>
1708
-
<p>A snapshot of this data is already available with the source in <ahref="https://github.com/RiskBasedPrioritization/RiskBasedPrioritizationAnalysis/data_in">data_in</a></p>
1708
+
<p>A snapshot of this data is already available with the source in <ahref="https://github.com/RiskBasedPrioritization/RiskBasedPrioritizationAnalysis/tree/main/data_in">data_in</a></p>
1709
1709
<ul>
1710
1710
<li>A date.txt file is included in each folder with the data that contains the date of download.</li>
1711
1711
</ul>
1712
1712
<p>But you can download current data as described here. </p>
1713
1713
</div>
1714
1714
<ul>
1715
-
<li><ahref="https://github.com/RiskBasedPrioritization/RiskBasedPrioritizationAnalysis/data/get_data.sh">get_data.sh</a> gets the data that can be downloaded automatically and used as-is.</li>
1715
+
<li><ahref="https://github.com/RiskBasedPrioritization/RiskBasedPrioritizationAnalysis/tree/main/data/get_data.sh">get_data.sh</a> gets the data that can be downloaded automatically and used as-is.</li>
1716
1716
<li>Other data is manually downloaded - see instructions below.<ul>
1717
1717
<li>MSRC</li>
1718
1718
<li>ExploitDB</li>
@@ -1724,7 +1724,7 @@ <h2 id="getting-data-from-data-sources">Getting Data from Data Sources<a class="
<p>Get <abbrtitle="National Vulnerability Database">NVD</abbr> data automatically</p>
1726
1726
<ul>
1727
-
<li>A notebook or script in <ahref="https://github.com/RiskBasedPrioritization/RiskBasedPrioritizationAnalysis/data_in/nvd">nvd</a> downloads the <abbrtitle="National Vulnerability Database">NVD</abbr> data.</li>
1727
+
<li>A notebook or script in <ahref="https://github.com/RiskBasedPrioritization/RiskBasedPrioritizationAnalysis/tree/main/data_in/nvd">nvd</a> downloads the <abbrtitle="National Vulnerability Database">NVD</abbr> data.</li>
1728
1728
<li>The data is output to data_out/CVSSData.csv.gz</li>
1729
1729
<li>Note: The download method used will be deprecated some time after Dec 2023 per <ahref="https://nvd.nist.gov/vuln/data-feeds">https://nvd.nist.gov/vuln/data-feeds</a></li>
0 commit comments