From 6ece25d80d5c90c33912a46ddeb4f48dafbd8519 Mon Sep 17 00:00:00 2001 From: Jacob Shandling <61553566+jacobshandling@users.noreply.github.com> Date: Fri, 7 Apr 2023 13:38:53 -0700 Subject: [PATCH] Update Vulnerability-Processing.md (#11049) --- docs/Using-Fleet/Vulnerability-Processing.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/Using-Fleet/Vulnerability-Processing.md b/docs/Using-Fleet/Vulnerability-Processing.md index e428ec4321..a1e8bed259 100644 --- a/docs/Using-Fleet/Vulnerability-Processing.md +++ b/docs/Using-Fleet/Vulnerability-Processing.md @@ -15,7 +15,7 @@ Vulnerability processing in Fleet detects vulnerable software installed on your Vulnerable software can have one or more vulnerabilities (CVEs). -For Fleet Premium users, each CVE includes its CVSS base score (reported by the [National Vulnerability Database](https://nvd.nist.gov/)), probability of exploit (reported by [FIRST](https://www.first.org/epss/)), and whether or not their is a known exploit in the wild (reported by the [Cybersecurity & Infrastructure Security Agency](https://www.cisa.gov/known-exploited-vulnerabilities-catalog)). +For Fleet Premium users, each CVE includes its CVSS base score (reported by the [National Vulnerability Database](https://nvd.nist.gov/)), probability of exploit (reported by [FIRST](https://www.first.org/epss/)), and whether or not there is a known exploit in the wild (reported by the [Cybersecurity & Infrastructure Security Agency](https://www.cisa.gov/known-exploited-vulnerabilities-catalog)). Fleet's strategy for detecting vulnerabilities (CVEs) varies according to the host's platform and the software in question. For macOS and Windows hosts, in general,