Solid guide . One question how do you decide what’s actually exploitable vs just high severity on paper?
Vulnerability Check & Triage Walkthrough
Amara GrahamLeader
posted
1 min read
1 Comment
Amara Graham
•
@[Andrey Turkin] CISA does that for me with their KEV (Known Exploited Vulnerabilities) Catalog. These are known to have already been exploited in the wild. I realized after I was using this as a datasource that the AI would probably always evaluate these as a high priority and requiring immediate mitigation. Oh well.
You can also find lists that are "just" CVEs and look really severe, but can't be exploited due to a variety of things. This is where I would leverage the AI tools companies are giving access to their source code and work collaboratively to determine if it's exploitable in that particularly setup/configuration/environment/etc.
Please log in to add a comment.
Please log in to comment on this post.
More Posts
- © 2026 Coder Legion
- Feedback / Bug
- Privacy
- About Us
- Contacts
- Premium Subscription
- Terms of Service
- Refund
- Early Builders
chevron_left
More From Amara Graham
Related Jobs
- Python developer @ Tampa, FLDiverse Lynx · Full time · Tampa, FL
- LAMP Full Stack Developer3B Staffing LLC · Full time · Dallas, TX
- SDC BCM Tech DevOps Engineer Senior TampaEY · Full time · Springfield, IL
Commenters (This Week)
noracarla75
3 comments
solomonneas
1 comment
sarmad
1 comment
Contribute meaningful comments to climb the leaderboard and earn badges!