Evidence of Exploitation
There are 6 primary rules that can impact the assigned Threat score and they are:
|
•
|
It has been linked to remote access Trojan |
|
•
|
It has been linked to ransomware |
|
•
|
It has been linked to penetration testing tools |
|
•
|
It has been linked to malware |
|
•
|
It has been linked to an exploit kit |
|
•
|
It has been linked to a cyber exploit |
|
•
|
It has been linked to POC verified |
|
•
|
It has been linked to vulnerability developed tools |
|
•
|
It has been linked to verified intelligence |
In Software Vulnerability Manager we provide the resulting score for any given Secunia Advisory to add value to the prioritization process. In Software Vulnerability Research, where a security persona requires more insight, we provide these Threat Scores for the Secunia Advisory, and for each vulnerability in the advisory. Further, we will show which of the rules above were triggered to arrive at the threat score presented.