To request support for a vulnerability and have it add it to Vulnerability Detection, contact Bitsight Support, Bitsight Customer Success, or your Bitsight Sales representative. If you’re submitting multiple vulnerabilities, sort them by priority.
Requests do not guarantee a vulnerability is added to inventory. Vulnerabilities must be safe to scan for, have viable data once scanned, and scanning activities must follow legalities. See limitations for details.
Prioritization
Vulnerabilities are prioritized based on the following criteria:
- Legality
- How likely are we able to gather telemetry without causing adverse effects?
- Interest
- How many of our users are requesting support for the vulnerability?
- Feasibility
- How difficult is it to check for the presence of the vulnerability?
- Notoriety
- Is the vulnerability appearing in a number of mainstream news publications?
- Impact
- How many companies are likely affected by the vulnerability?
- Urgency
- Is the vulnerability highlighted by standard bodies, such as CISA?
- Exploitability
- How likely is this vulnerability to be exploited?
Feedback
0 comments
Please sign in to leave a comment.