Skip to content

Commit f596cbb

Browse files
author
Renae Metcalf
committed
Fix broken link to cwe examples and remove cwe csvs file to enforce a single source of truth.
1 parent 8812f26 commit f596cbb

File tree

2 files changed

+1
-158
lines changed

2 files changed

+1
-158
lines changed

data/csvs/cwe/possible-cwe-with-poc-examples.csv

Lines changed: 0 additions & 157 deletions
This file was deleted.

docs/topics/information_sources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ However, if there is a category of information source we have not captured, plea
1616
## Exploitation
1717

1818
Various vendors provide paid feeds of vulnerabilities that are currently exploited by attacker groups.
19-
Any of these could be used to indicate that [*active*](../reference/decision_points/exploitation.md) is true for a vulnerability.
19+
Any of these could be used to indicate that [*active*](../../reference/decision_points/exploitation/#cwe-ids-for-poc) is true for a vulnerability.
2020
Although the lists are all different, we expect they are all valid information sources; the difficulty is matching a list's scope and vantage with a compatible scope and vantage of the consumer.
2121
We are not aware of a comparative study of the different lists of active exploits; however, we expect they have similar properties to block lists of network touchpoints [@metcalf2015blocklist] and malware [@kuhrer2014paint].
2222
Namely, each list has a different view and vantage on the problem, which makes them appear to be different, but each list accurately represents its particular vantage at a point in time.

0 commit comments

Comments
 (0)