Details of the vulnerability identified in a finding.
The Cybersecurity and Infrastructure Security Agency (CISA) details for a specific vulnerability.
The Common Weakness Enumerations (CWEs) associated with the vulnerability.
The Exploit Prediction Scoring System (EPSS) score of the vulnerability.
Information on the evidence of the vulnerability.
Contains information on when this exploit was observed.
The finding ARN that the vulnerability details are associated with.
The reference URLs for the vulnerability data.
The risk score of the vulnerability.
The known malware tools or kits that can exploit the vulnerability.
The MITRE adversary tactics, techniques, or procedures (TTPs) associated with the vulnerability.