You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/topics/information_sources.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,11 +89,9 @@ This ambiguity makes it impossible to cleanly map the [*Technical Impact*](../re
89
89
90
90
As mentioned in the discussion of [*Exploitation*](../reference/decision_points/exploitation.md), [CWE](https://cwe.mitre.org/) could be used to inform one of the conditions that satisfy [*proof of concept*](../reference/decision_points/exploitation.md).
91
91
For some classes of vulnerabilities, the proof of concept is well known because the method of exploitation is already part of open-source tools.
92
-
For example, on-path attacker scenarios for intercepting TLS certificates.
92
+
An example of this is on-path attacker scenarios for intercepting TLS certificates.
93
93
These scenarios are a cluster of related vulnerabilities.
94
-
Since CWE classifies clusters of related vulnerabilities, the community could likely curate a list of CWE-IDs for which this condition of well known exploit technique is satisfied.
95
-
Once that list were curated, it could be used to automatically populate a CVE-ID as [*proof of concept*](../reference/decision_points/exploitation.md) if the CWE-ID of which it is an instance is on the list.
96
-
Such a check could not be exhaustive, since there are other conditions that satisfy [*proof of concept*](../reference/decision_points/exploitation.md).
94
+
We provide a non-exhaustive [list of CWE-IDs with known proofs of concept](../reference/decision_points/exploitation/#cwe-ids-for-poc). This is list is non-exhaustive becuase there are other conditions that satisfy [*proof of concept*](../reference/decision_points/exploitation.md).
97
95
If paired with automatic searches for exploit code in public repositories, these checks would cover many scenarios.
98
96
If paired with active exploitation feeds discussed above, then the value of [*Exploitation*](../reference/decision_points/exploitation.md) could be determined almost entirely from available information without direct analyst involvement at each organization.
0 commit comments