Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

CVSS

Below you will find reports with the tag of “CVSS”

image from The Evolving CVE Landscape

The Evolving CVE Landscape

In this report, sponsored by F5 Labs, we take a step back and examine the universe of vulnerabilities (defined by the CVE) and how it’s changed in the last 20 years. As you will see, we will find some surprising things along the way.

(more available)
Added: March 1, 2023
image from State of Software Security: Open Source Edition

State of Software Security: Open Source Edition

A special edition of the Veracode SOSS series, focusing on the vulnerabilities present in open source software libraries and the surrounding ecosystem.

(more available)
Added: May 19, 2020
image from The state of JavaScript frameworks security report 2019

The state of JavaScript frameworks security report 2019

This report covers: the security practices for each of the two different core projects, both Angular and React, the state of security of each of the two different module ecosystems, based on an in-depth look at the vulnerabilities contained in each of the ecosystems, the security practices for other common JavaScript frontend framework alternatives such as Vue.js, Bootstrap and jQuery, and the significant security differences between the different alternatives, and particularly between Angular and React

(more available)
Added: February 12, 2020
image from How The Vulnerability And Threat Landscape Changed in 2018

How The Vulnerability And Threat Landscape Changed in 2018

This infographic provides brief insight into the corresponding 2019 Threat and Vulnerability Trends report.

Added: February 12, 2019
image from Prioritization To Prediction

Prioritization To Prediction

This paper begins with a review of data sources available for building or improving decision models for vulnerability remediation. It then discusses the vulnerability lifecycle and examine timelines and triggers surrounding key milestones. Identifying attributes of vulnerabilities that correlate with exploitation comes next on the docket. The last section measures the outcomes of several remediation strategies and develops a model that optimizes overall effectiveness.

(more available)
Added: October 24, 2018
image from 2018 Vulnerability Statistcs Report

2018 Vulnerability Statistcs Report

This Report provides key takeaways from the vulnerability issues of 2017.

Added: October 12, 2018
© Cyentia Institute 2025
Library updated: June 27, 2025 00:08 UTC (build b1d7be4)