{"id":39049,"date":"2021-01-08T09:30:10","date_gmt":"2021-01-08T09:30:10","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\/"},"modified":"2021-01-08T09:30:10","modified_gmt":"2021-01-08T09:30:10","slug":"how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\/","title":{"rendered":"How good are you at scoring security vulnerabilities, really? Boffins seek infosec pros to take rating skill survey"},"content":{"rendered":"<p>A German academic is running a study into the effectiveness of vulnerability scores \u2013 and is hoping the research will shed more light on the occasionally controversial system.<\/p>\n<p>By running a survey on whether infosec bods think the Common Vulnerability Scoring System (CVSS) is a useful tool for assessing security flaws, Dr Zinaida Benenson of Friedrich-Alexander Universit\u00e4t Erlangen-N\u00fcrnberg&#8217;s IT Security Infrastructure Lab in Germany hopes to further the infosec world&#8217;s understanding of how reliable the system really is.<\/p>\n<div class=\"adun\" data-pos=\"top\" data-raptor=\"eagle\" data-xsm=\",button,mpu_plusplus,\" data-sm=\",button,mpu_plusplus,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x250%7C300x252%7C300x600&amp;tile=3&amp;c=33X-gyH8GotySHdBV@qJRbUAAAAAI&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x250%7C300x252%7C300x600&amp;tile=3&amp;c=33X-gyH8GotySHdBV@qJRbUAAAAAI&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>While the survey hopes to gain up to 300 respondents, Benenson was coy about precisely what she&#8217;s hoping to prove or disprove, but she did drop <i>The Register<\/i> a hint about the current state of CVSS scoring.<\/p>\n<p>In preliminary research, Benenson and her fellow researchers asked a handful of infosec bods to allocate CVSS scores to 10 sample vulnerabilities, as a way of testing how consistent their scoring was.<\/p>\n<p>&#8220;I&#8217;m not naming the vulnerabilities, because some of them are now in the survey, but just to give you a feeling&#8230;&#8221; she said, sending us a partial table of scores from that exercise:<\/p>\n<pre class=\"wrap_text\">\nvuln 1: 4.7, 5.4, 6.1, 6.3, 7.3, 7.5\nvuln 2: 3.0, 4.8, 5.0, 5.4, 6.5, 7.1, 7.6, 8.4\nvuln 3: 4.7, 6.8, 7.2, 8.2, 9.0, 9.8\n[...]\nvuln 7: 3.1, 4.2, 4.8, 5.3, 6.5, 7.5, 8.3, 9.3\n[...]\nvuln 10: 0.0., 3.7, 5.3, 8.2, 8.8\n<\/pre>\n<p>&#8220;Some of the scores were of course the same for different experts, but on the whole, there wasn&#8217;t much agreement,&#8221; Benenson added. &#8220;And I&#8217;m not picking especially weird vulnerabilities, all 10 of them were rated like this.&#8221;<\/p>\n<p>The CVSS survey can be <a target=\"_blank\" href=\"https:\/\/user-surveys.cs.fau.de\/index.php?r=survey\/index&amp;sid=248857\" rel=\"noopener noreferrer\">found here<\/a>.<\/p>\n<p>CVSS was <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2005\/02\/23\/cvss\/\" rel=\"noopener noreferrer\">invented in 2005<\/a> when Cisco, Microsoft, Qualys, Symantec and others joined forces to announce the scoring system we all know and, er, love. In the decade-and-a-half since then, CVSS has become the standard at-a-glance measure of a given vulnerability&#8217;s severity, with the worst reaching 10.0 on the system&#8217;s ten-point scoring scale.<\/p>\n<p>Scores are commonly allocated to vulnerabilities along with a Common Vulnerabilities and Exposure (CVE) number, which has led to the undesirable practice of researchers &#8220;collecting&#8221; high-severity CVEs by <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2019\/03\/08\/thales_topseries_vuln\/\" rel=\"noopener noreferrer\">using dubious methods<\/a>.<\/p>\n<p>A recent example of a 10.0-rated CVEs was a VMware vCenter vuln that <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/04\/17\/vmware_vcenter_critical_vuln_anyone_create_admin_users\/\" rel=\"noopener noreferrer\">allowed anyone at all to remotely create an admin-level account<\/a>. Lower down the scale, but still significant, was <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/06\/12\/connectwise_security\/\" rel=\"noopener noreferrer\">a CVSS 7.8-graded flaw in ConnectWise&#8217;s Automate product<\/a> that allowed someone with user credentials to remotely run commands on an Automate instance.<\/p>\n<div class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",button,dbutton,mpu_plus,dmpu,\" data-sm=\",button,dbutton,mpu_plus,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x100%7C300x250%7C300x251&amp;tile=4&amp;c=44X-gyH8GotySHdBV@qJRbUAAAAAI&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x100%7C300x250%7C300x251&amp;tile=4&amp;c=44X-gyH8GotySHdBV@qJRbUAAAAAI&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Referring to the table of varied CVSS scores she showed us, Benenson said: &#8220;We are not saying that CVSS experts are not skilful. We are trying to find factors behind the fact that the scores are so different. Actually, the scores are supposed to be the same across different actors; this is the idea of CVSS.&#8221; \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2021\/01\/08\/cvss_scoring_survey\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Real-world CVSS figures are a little variable, or so these folks reckon A German academic is running a study into the effectiveness of vulnerability scores \u2013 and is hoping the research will shed more light on the occasionally controversial system.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-39049","post","type-post","status-publish","format-standard","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How good are you at scoring security vulnerabilities, really? Boffins seek infosec pros to take rating skill survey 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How good are you at scoring security vulnerabilities, really? Boffins seek infosec pros to take rating skill survey 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-08T09:30:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x250%7C300x252%7C300x600&amp;tile=3&amp;c=33X-gyH8GotySHdBV@qJRbUAAAAAI&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How good are you at scoring security vulnerabilities, really? Boffins seek infosec pros to take rating skill survey\",\"datePublished\":\"2021-01-08T09:30:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\\\/\"},\"wordCount\":443,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x250%7C300x252%7C300x600&amp;tile=3&amp;c=33X-gyH8GotySHdBV@qJRbUAAAAAI&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dtop%26test%3D0\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\\\/\",\"name\":\"How good are you at scoring security vulnerabilities, really? Boffins seek infosec pros to take rating skill survey 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x250%7C300x252%7C300x600&amp;tile=3&amp;c=33X-gyH8GotySHdBV@qJRbUAAAAAI&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2021-01-08T09:30:10+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x250%7C300x252%7C300x600&amp;tile=3&amp;c=33X-gyH8GotySHdBV@qJRbUAAAAAI&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x250%7C300x252%7C300x600&amp;tile=3&amp;c=33X-gyH8GotySHdBV@qJRbUAAAAAI&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How good are you at scoring security vulnerabilities, really? Boffins seek infosec pros to take rating skill survey\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How good are you at scoring security vulnerabilities, really? Boffins seek infosec pros to take rating skill survey 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\/","og_locale":"en_US","og_type":"article","og_title":"How good are you at scoring security vulnerabilities, really? Boffins seek infosec pros to take rating skill survey 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-01-08T09:30:10+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x250%7C300x252%7C300x600&amp;tile=3&amp;c=33X-gyH8GotySHdBV@qJRbUAAAAAI&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How good are you at scoring security vulnerabilities, really? Boffins seek infosec pros to take rating skill survey","datePublished":"2021-01-08T09:30:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\/"},"wordCount":443,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x250%7C300x252%7C300x600&amp;tile=3&amp;c=33X-gyH8GotySHdBV@qJRbUAAAAAI&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dtop%26test%3D0","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\/","url":"https:\/\/www.threatshub.org\/blog\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\/","name":"How good are you at scoring security vulnerabilities, really? Boffins seek infosec pros to take rating skill survey 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x250%7C300x252%7C300x600&amp;tile=3&amp;c=33X-gyH8GotySHdBV@qJRbUAAAAAI&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dtop%26test%3D0","datePublished":"2021-01-08T09:30:10+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x250%7C300x252%7C300x600&amp;tile=3&amp;c=33X-gyH8GotySHdBV@qJRbUAAAAAI&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x250%7C300x252%7C300x600&amp;tile=3&amp;c=33X-gyH8GotySHdBV@qJRbUAAAAAI&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-good-are-you-at-scoring-security-vulnerabilities-really-boffins-seek-infosec-pros-to-take-rating-skill-survey\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"How good are you at scoring security vulnerabilities, really? Boffins seek infosec pros to take rating skill survey"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39049"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39049\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}