Evidence of Exploitation

There are 10 primary rules that can impact the assigned Threat score and they are:

It has been linked to remote access Trojan
It has been linked to ransomware
It has been linked to penetration testing tools
It has been linked to malware
It has been linked to an exploit kit
It has been linked to a cyber exploit
It has been linked to an exploit wild
It has been linked to POC verified
It has been linked to vulnerability developed tools
It has been linked to verified intelligence

In Software Vulnerability Manager we provide the resulting score for any given Secunia Advisory to add value to the prioritization process. In Software Vulnerability Research, where a security persona requires more insight, we provide these Threat Scores for the Secunia Advisory, and for each vulnerability in the advisory. Further, we will show which of the rules above were triggered to arrive at the threat score presented.