Replies: 4 comments
-
👍 This would be a cool enrichment to have. It could also potentially be done in a module. My modules knowledge is minimal so far but I think a module would be limited to just adjusting the severity and not adding a separate field, which isn't as ideal IMO |
Beta Was this translation helpful? Give feedback.
-
This is a nice idea. If someone is interested in working on it, we'd welcome the contribution. If not, we can consider it in a future planning cycle. |
Beta Was this translation helpful? Give feedback.
-
We used to work on that, but it's suspended now because we were not sure how we should display it in the table format. |
Beta Was this translation helpful? Give feedback.
-
Wow looks like you were way ahead of me 😄 Is there something that the community can help with there? Or is it just a matter of waiting for a design decision? |
Beta Was this translation helpful? Give feedback.
-
Hello
CISA agency maintains catalog of vulnerabilities that are known to be confirmed exploited https://www.cisa.gov/known-exploited-vulnerabilities-catalog and constantly updates it. It may look like majority is for desktop software and alike, but there are some vulnerabilities for software/libraries often found in containers.
Suggestion is to include this information in the vulnerability report, so reader can prioritize remediation. Perhaps it can be additional field, e.g. known_exploited=true/false.
Thank you.
Beta Was this translation helpful? Give feedback.
All reactions