{"id":29901,"date":"2021-11-29T12:33:56","date_gmt":"2021-11-29T12:33:56","guid":{"rendered":"https:\/\/www.thepicpedia.com\/blog\/adobe\/important-changes-to-adobe-security-bulletins\/"},"modified":"2021-11-29T12:33:57","modified_gmt":"2021-11-29T12:33:57","slug":"important-changes-to-adobe-security-bulletins","status":"publish","type":"post","link":"https:\/\/www.thepicpedia.com\/blog\/adobe\/important-changes-to-adobe-security-bulletins\/","title":{"rendered":"Important changes to Adobe Security Bulletins"},"content":{"rendered":"
\n

Releasing regular security updates is one of the ways Adobe constantly strives to improve the security of our products to protect our customers and their data. The accompanying security bulletins help both customers and our partners understand the details of the vulnerabilities we\u2019ve identified and fixed in our products.<\/p>\n

Beginning with the June 2021 security bulletins, we\u2019ve made some changes to help you identify and calculate the quantifiable risk from vulnerabilities, which in turn, will help you make better and more informed decisions regarding patch management.<\/p>\n

The new additions to the security bulletins include:<\/p>\n

Mapping all security vulnerabilities<\/strong> to the CWE (Common Weakness Enumeration) list. CWE is a community-developed list of common software and hardware security weaknesses. Mapping Adobe vulnerabilities to the CWE list will standardize the vulnerability descriptions and provide you with more information about the details and impact of a vulnerability type.
\nPublishing<\/strong> CVSS (Common Vulnerability Scoring System) scores for security vulnerabilities<\/strong>. Along with categorizing our vulnerabilities in a qualitative manner (e.g., moderate, important, and critical), we will assign an industry-standard CVSS score to calculate the threat level of a vulnerability. These values range from 0 to 10, with 0 being the lowest and 10 being the highest risk. This score will help you better manage your vulnerabilities.
\nProviding the CVSS vector for each vulnerability<\/strong>. Along with the CVSS score, we are also providing the vector, which defines the vulnerability\u2019s parameters and attributes and identifies the values that lead to the specific CVSS value for that vulnerability. The CVSS vector contains the following information:
\nAttack Vector (AV)
\nAttack Complexity (AC)
\nPrivileges Required (PR)
\nUser Interaction (UI)
\nScope (S)
\nConfidentiality (C)
\nIntegrity (I)
\nAvailability (A)<\/p>\n

The CVSS vector for any vulnerability can be calculated via using this calculator. You can find more information about the CVSS standard with examples on the FIRST.org website.<\/p>\n

Including our team\u2019s email address.<\/strong> To make the Adobe PSIRT team more accessible for queries or clarifications, we\u2019ve added the team\u2019s email address at the bottom of all our security bulletins. We hope this will help to ensure quick and easy resolution directly from the documentation\u2019s authors.<\/p>\n

We hope these changes are helpful. If you have any suggestions for possible future improvements, please let our team know via email.<\/p>\n<\/div>\n

Source : Adobe<\/p>\n","protected":false},"excerpt":{"rendered":"

Releasing regular security updates is one of the ways Adobe constantly strives to improve the security of our products to protect our customers and their data. The accompanying security bulletins help both customers and our partners understand the details of the vulnerabilities we\u2019ve identified and fixed in our products. Beginning with the June 2021 security …<\/p>\n","protected":false},"author":1,"featured_media":29903,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thepicpedia.com\/wp-json\/wp\/v2\/posts\/29901"}],"collection":[{"href":"https:\/\/www.thepicpedia.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thepicpedia.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thepicpedia.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thepicpedia.com\/wp-json\/wp\/v2\/comments?post=29901"}],"version-history":[{"count":1,"href":"https:\/\/www.thepicpedia.com\/wp-json\/wp\/v2\/posts\/29901\/revisions"}],"predecessor-version":[{"id":29904,"href":"https:\/\/www.thepicpedia.com\/wp-json\/wp\/v2\/posts\/29901\/revisions\/29904"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thepicpedia.com\/wp-json\/wp\/v2\/media\/29903"}],"wp:attachment":[{"href":"https:\/\/www.thepicpedia.com\/wp-json\/wp\/v2\/media?parent=29901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thepicpedia.com\/wp-json\/wp\/v2\/categories?post=29901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thepicpedia.com\/wp-json\/wp\/v2\/tags?post=29901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}