Home / Companies / Snyk / Blog / Post Details
Content Deep Dive

What’s so wild about exploits in the wild - and how can we prioritize accordingly?

Blog post from Snyk

Post Details
Company
Date Published
Author
Rachel Cheyfitz
Word Count
1,409
Language
English
Hacker News Points
-
Summary

Exploits in the wild pose a significant risk to systems, with only a small percentage of known vulnerabilities being exploited. Evaluating the maturity of exploit code can help prioritize and quickly handle vulnerabilities accordingly. Factors such as practicality and required expertise level influence the risk posed by published exploits. Prioritizing according to exploit maturity can effectively pinpoint the riskiest vulnerabilities, narrowing them down to about 10% of the total. This approach is essential for effective vulnerability remediation and protection against real-life attacks like the Apache Struts breach that exposed sensitive data of millions of customers. By evaluating exploit code maturity, developers can make informed decisions on which vulnerabilities to address first and reduce the risk of exploitation.