Evidence of Exploitation

There are 6 primary rules that can impact the assigned Threat score and they are:

It has been linked to remote access Trojan
It has been linked to ransomware
It has been linked to penetration testing tools
It has been linked to malware
It has been linked to an exploit kit
It has been linked to a cyber exploit

In Software Vulnerability Manager we provide the resulting score for any given Secunia Advisory to add value to the prioritization process. In Software Vulnerability Research, where a security persona requires more insight, we provide these Threat Scores for the Secunia Advisory, and for each vulnerability in the advisory. Further, we will show which of the rules above were triggered to arrive at the threat score presented.