Questions tagged [vulnerability-management]

67 questions
1
vote
0 answers

Vulnerabilities arising from Interations between application and environment

Suppose I have a 'secure' environment - a few servers running operating systems hardened according to best practice, likewise for network devices, user accounts with minimal permissions and a good system for managing and monitoring them, firewalls…
Baron Mingus
  • 111
  • 2
1
vote
0 answers

Is there away to retrieve results (including found vulnerabilities) of a specific scan from one API call?

Is there away to retrieve results (including found vulnerabilities) of a specific scan from one API call? From InsightVm documentation, the GET scan API call returns only scan info with statistics of the found vulnerabilities, without information of…
1
vote
1 answer

Common practice when CVSS v2 score over represents severity

We're formalizing our vulnerability management process and decided to use CVSS V2 to help decide what vulnerabilities to remediate. We're running into a situation where a vulnerability's severity score has crossed our remediation threshold, but the…
anchovie
  • 23
  • 2
1
vote
0 answers

UDF Client, Socket Binding and Tags Hack - Need Help

Background For a long time now, I've been working to remove a persistent, if not permanent, malware presence on my computers and phones. Every attempt at removal has been unsuccessful to date, by me and many others. I've seen over time,…
1
vote
3 answers

Vulnerability management and assessment tracking solutions

How does your company track the vulnerability management information that happens between receiving a vulnerability scan report and remediating a vulnerability? Given the following example: Scan A detects Vuln 1 Vuln 2 Vuln 3 You decide not…
1
vote
1 answer

Exploit database for NVD vulnerabilities

I have the list of vulnerabilities (CVEs) in the NVD database. I need to find which one has an exploit. Is there any database available to get the list of all the exploits for CVEs? or is there any API to get them?
MOH
  • 31
  • 5
1
vote
0 answers

Windows Possible Vectors for Privilege Escalation From "Weak" Folder ACLs

I am doing a security analysis and I am trying to figure out what the possible attack vectors and possibility of privilege escalation's are of the way this program is setup? I used Attack Surface Analyzer which flagged the "MyService" installed by…
1
vote
0 answers

CVSS Alternatives?

I am looking for suggestions of alternatives to vulnerability scoring systems such as CVSS & DREAD. I have found that DREAD is too subjective to work and CVSS was ranking everything too highly and doesn't really fit. I'm thinking about some…
1
vote
2 answers

How can I change windows security settings using python? i.e. Password Requirements / Require Ctrl - Alt - Delete to log in

I am writing code in Python 2 or 3 to script Cybersecurity functions. Functions such as Lockout Duration, Password Length, and other things that involve a lot of clicking that could easily be automated. import subprocess subproccess.call(x, shell =…
1
vote
0 answers

Is using AWS and administered VMs a reasonable and feasible secure environment?

I'm currently tasked with exploring options for hosting secure data for our company that don't require setting up any in-house infrastructure as we don't currently have any. Everyone is a developer and every can pretty much be counted as working…
1
vote
1 answer

How to acquire security advisory for CentOS?

I've been seeing security advisory number like CESA-2017:1842, and after search I could only find some of them in mailing list archives such as this. Is there a website like https://usn.ubuntu.com or https://access.redhat.com/security/ that…
Sajuuk
  • 271
  • 3
  • 11
1
vote
3 answers

What is the difference between patch management and vulnerability management?

I've been thinking about this lately. are they the same thing? or is the latter has a lot more than just management of patches?
Sajuuk
  • 271
  • 3
  • 11
1
vote
1 answer

Interpreting CVE ratings: Buffer Overflow vs. Denial of Service vs. Remote Code Executing (RCE)

If a CVE lists a buffer overflow vulnerability, but not a remote code execution, should I interpret that as: This vulnerability has not been confirmed to expose RCE, or This vulnerability has been confirmed to not expose RCE, or Somebody (who?)…
jtpereyda
  • 1,430
  • 2
  • 16
  • 26
1
vote
2 answers

What app owners need to do while they resolve XSS to minimize risk?

I have submitted a pentest report in which I have reported XSS at a few locations in an application. The management agreed to the risk. They have planned to remediate the issue in the next thirty days. However, they asked what needs to be done from…
one
  • 1,781
  • 3
  • 18
  • 45
1
vote
0 answers

Why OVAL deprecated SQL format?

I'm a developer to develop a vulnerability management program. I'm currently analyzing OVAL. Do you know why OVAL deprecated the SQL format? I read through the following…
afraxas
  • 11
  • 2