You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<p>A CVEs "scored 4.0 or higher by the <abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr>" is pretty much all CVEs
1525
1525
(>96%) per "<abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Severity Rating Scale"</p>
1526
-
<p>The organization uses <abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> score and "Likelihood of Exploit" to
1526
+
<p>The organization uses <abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> score and "Likelihood of Exploitation" to
1527
1527
prioritize CVEs for the <abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> threshold required by regulation.
<li>"The focus should be given to CVEs known to be exploited in the wild (<abbrtitle="Cybersecurity & Infrastructure Security Agency">CISA</abbr><abbrtitle="Known Exploited Vulnerability">KEV</abbr>), those with a high likelihood of exploitation (indicated by a high <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> score), and those with weaponized exploit code available"</li>
4986
-
<li>The Qualys scoring / priority for "Likelihood of Exploit" factors is in this order<ol>
4986
+
<li>The Qualys scoring / priority for "Likelihood of Exploitation" factors is in this order<ol>
<p>A simple illustrative scheme that combines Base Score Ratings with Exploitation status is defined here.</p>
5453
5453
<ul>
5454
5454
<li><ahref="#vendors-qualys-in-depth-look-into-data-driven-science-behind-qualys-trurisk">Qualys TruRisk</a> is an example of this type of scheme.</li>
5455
+
<li>
5456
+
<divclass="admonition quote">
5457
+
<pclass="admonition-title">Quote</p>
5458
+
"The focus should be given to CVEs known to be exploited in the wild (<abbrtitle="Cybersecurity & Infrastructure Security Agency">CISA</abbr><abbrtitle="Known Exploited Vulnerability">KEV</abbr>), those with a high likelihood of exploitation (indicated by a high <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> score), and those with weaponized exploit code available"</div>
<p>A simple illustrative scheme that combines Base Score Ratings with Exploitation status is defined here.</p>
1606
1606
<ul>
1607
1607
<li><ahref="../../vendors/Qualys/#in-depth-look-into-data-driven-science-behind-qualys-trurisk">Qualys TruRisk</a> is an example of this type of scheme.</li>
1608
+
<li>
1609
+
<divclass="admonition quote">
1610
+
<pclass="admonition-title">Quote</p>
1611
+
"The focus should be given to CVEs known to be exploited in the wild (<abbrtitle="Cybersecurity & Infrastructure Security Agency">CISA</abbr><abbrtitle="Known Exploited Vulnerability">KEV</abbr>), those with a high likelihood of exploitation (indicated by a high <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> score), and those with weaponized exploit code available"</div>
Copy file name to clipboardExpand all lines: vendors/Qualys/index.html
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -1704,7 +1704,7 @@ <h3 id="comparison-of-cves-with-qualys-qvs-and-epss-scores"><strong>Comparison o
1704
1704
<pclass="admonition-title">Takeaways</p>
1705
1705
<ol>
1706
1706
<li>"The focus should be given to CVEs known to be exploited in the wild (<abbrtitle="Cybersecurity & Infrastructure Security Agency">CISA</abbr><abbrtitle="Known Exploited Vulnerability">KEV</abbr>), those with a high likelihood of exploitation (indicated by a high <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> score), and those with weaponized exploit code available"</li>
1707
-
<li>The Qualys scoring / priority for "Likelihood of Exploit" factors is in this order<ol>
1707
+
<li>The Qualys scoring / priority for "Likelihood of Exploitation" factors is in this order<ol>
0 commit comments