Vulnerability Rating TaxonomyFor Faster RemediationVulnerability Rating TaxonomyBugcrowd’s VRT is a widely-used, open source standard, offering a baseline risk-rating for each vulnerability submitted via Crowdcontrol. The VRT directly maps to the CVSS taxonomy.Remove SubjectivityAligns customers and hackers with a common taxonomy.Provide ContextCreates tighter matching between actual risk and the taxonomy rating.Remediate FasterFocuses efforts on remediating vulnerabilities rather than prioritizing bugs.REMOVES SUBJECTIVITY & PROVIDES CONTEXTThe VRT is superior to alternative taxonomies in four critical areas, and integrates with industry best practices such as CVSS.TransparencyProvides a baseline for the technical nature of each bug submission.DepthUnparalleled granularity aligns with real-world application security exploits.FlexibilityOpen sourced, mapped to CVSS, and curated weekly by Bugcrowd experts.SimplicityQuickly identify the impact of vulnerabilities without a complicated calculator.Bugcrowd Maps To CVSSBugcrowd supports CVSS (Common Vulnerability Scoring System) as well as VRT. A CVSS score is automatically generated within the Crowdcontrol platform as soon as the submission has been assigned a VRT rating. If you choose to do so, the CVSS score can be adjusted by using the built-in CVSS 3.0 calculator in Crowdcontrol.Learn MoreImplications for CustomersOur VRT helps customers provide clear guidelines and reward ranges to Hackers hunting on their programs. When vulnerabilities are ready to be fixed, customers receive VRT-mapped remediation advice to help fix what’s found, faster. For more information on our priority rating and worth of a bug, read our recently launched guide “What’s A Bug Worth“.Implications for Bug Hunters Our VRT helps Hackers compartmentalize and target specific vulnerability types, based on their objective priority to Bugcrowd customers. We hope that being transparent about the typical priority level for various bug types will help program participants save valuable time and effort in their quest to make bounty targets more secure.Interested in becoming a Bugcrowd researcher? Join the crowd.Free GuideThe Ultimate Guide to Managed Bug BountyA comprehensive guide to crowdsourced security and the how to implement a successful managed bug bounty program as part of your application security strategy.Learn MoreFrom Our BlogMay 18, 2022How to get Private Invites on the Bugcrowd PlatformMay 10, 2022What is a Bugcrowd Joinable Program?May 9, 2022Introducing LevelUpX – Resources for the Community by the CommunityMORE BLOG POSTSNewsFebruary 15, 2022Bugcrowd Announces Real-Time Customer Visibility and Improved Crowd-matching For Penetration Testing as a Service SolutionFebruary 3, 2022Wormhole Blockchain Bridge Exploited for Over $300 MillionFebruary 3, 2022Determining the Appropriate Penetration Testing MethodMORE NEWSEventsJoin us at RSA 2022Join top cybersecurity leaders and a dedicated community of peers as we exchange the biggest, boldest ideas that will help…Register NowCyber Security Summit DC MetroJoin Bugcrowd’s Virtual Booth at Cyber Security DC Metro and Catch Murtaza Hafizji’s Speech at 3PM EST.Register NowCyber Security Summit ChicagoJoin Bugcrowd’s Virtual Booth at Cyber Security Chicago and Catch Murtaza Hafizji’s Speech at 3PM EST.Register NowMORE EVENTS
February 15, 2022Bugcrowd Announces Real-Time Customer Visibility and Improved Crowd-matching For Penetration Testing as a Service Solution