You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Use Case:
It seems to be reasonable to track only vulnerabilities above a certain EPSS / CVSS levels. This woldn't work reliable because of EPSS calculation scheme. It's possible to get a really low EPSS for known exploitet vulnerabilities. Have a look at: CVE-2021-4034.
FIRST publishes today for this exploited vulnerability an EPSS below 0.1: https://api.first.org/data/v1/epss?cve=CVE-2021-4034.
This isn't a error, see: Everyone knows this vulnerability has been exploited, why doesn’t EPSS score it at 100%? at FAQ page (https://www.first.org/epss/faq).
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
Hi,
I suggest to add support for CISA's known exploited vulnerabilities catalog in DT.
Use Case:
It seems to be reasonable to track only vulnerabilities above a certain EPSS / CVSS levels. This woldn't work reliable because of EPSS calculation scheme. It's possible to get a really low EPSS for known exploitet vulnerabilities. Have a look at: CVE-2021-4034.
FIRST publishes today for this exploited vulnerability an EPSS below 0.1: https://api.first.org/data/v1/epss?cve=CVE-2021-4034.
This isn't a error, see: Everyone knows this vulnerability has been exploited, why doesn’t EPSS score it at 100%? at FAQ page (https://www.first.org/epss/faq).
Thank you for your comments.
Jörg
Beta Was this translation helpful? Give feedback.
All reactions