Requesting Support for a Vulnerability Ingrid To request support for a vulnerability and have it add it to Vulnerability Detection, contact Bitsight Support, Bitsight Customer Success, or your Bitsight Sales representative. If you’re submitting multiple vulnerabilities, sort them by priority. Requests do not guarantee a vulnerability is added to inventory. Vulnerabilities must be safe to scan for, have viable data once scanned, and scanning activities must follow legalities. See limitations for details. Prioritization Vulnerabilities are prioritized based on the following criteria: Legality How likely are we able to gather telemetry without causing adverse effects? Interest How many of our users are requesting support for the vulnerability? Feasibility How difficult is it to check for the presence of the vulnerability? Notoriety Is the vulnerability appearing in a number of mainstream news publications? Impact How many companies are likely affected by the vulnerability? Urgency Is the vulnerability highlighted by standard bodies, such as CISA? Exploitability How likely is this vulnerability to be exploited? Related articles How to Get Help How Vulnerability Detection Data is Collected Vulnerability Prioritization: DVE & EPSS Finding Rescan: Asset Not Found and Assumed Remediated Vulnerability Severity: Bitsight Severity & CVSS Feedback 0 comments Please sign in to leave a comment.