-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New entity type "exploit" #797
Comments
Yeah maybe it's not a bad idea. !
I also propose this : Problem to SolveImport the CPE dictionnary inside openCTI. Proposed Solution
|
@SamuelHassine any thoughts on that? |
+1 |
Create a new SDO "Exploit" to be displayed in the "Arsenal" section: Exploit attributes:
Relationships: Exploit => targets => Vulnerability |
I have a project similar to this issue, so I was wondering if someone had started working on it? |
@Jipegien concerning the marking of exploited vulnerabilities the entity seems to be the way to go. Any ETA? |
Hello @iFrozenPhoenix! Currently we are using Malware entity and the malware_type open vocab to identify "Exploits". We do not plan to develop a specific Exploit entity anytime soon. Is it not enough to cover your use case? |
Problem to Solve
PoCs and Exploits, once developed and published can significantly change Vulnerability Assessments. There appears to be no dedicated area withing CVE 'Knowledge' to add information regarding a PoC or exploit (usually found as Python script).
Current Workaround
Added in Notes section of CVE, and Tagged as PoC or Exploit
Proposed Solution
Create an Entity type as PoC or Exploit and allow relationships with CVE's
Additional Information
The PoC/Exploit could be sourced from www.exploit-db.com (or elsewhere) as a Connector, or manually added. It could have the following properties:
The text was updated successfully, but these errors were encountered: