Solutions and Applications
...
References
Vulnerability Finding Data Model
1 min
title key type vulnerability finding finding object merged risk scores finding merged risk scores string vulnerability commercial exploit found finding vulnerability commercial exploit found string vulnerability cvss base score finding vulnerability cvss base score integer vulnerability cvss temporal/threat score finding vulnerability cvss temporal threat score integer vulnerability cvss vector string finding vulnerability cvss vector string string vulnerability cvss version finding vulnerability cvss version string vulnerability description finding vulnerability description string vulnerability epss percentile finding vulnerability epss percentile integer vulnerability epss score finding vulnerability epss score integer vulnerability exploits trending on github finding vulnerability exploits trending on github string vulnerability exploits finding vulnerability exploits string vulnerability finding asset criticality finding vulnerability finding asset criticality integer vulnerability finding asset zone criticality finding vulnerability finding asset zone criticality integer vulnerability finding asset remedation channel finding vulnerability finding asset remedation channel string vulnerability finding asset remedation owner finding vulnerability finding asset remedation owner string vulnerability finding asset reference finding vulnerability finding asset reference array vulnerability finding asset zone finding vulnerability finding asset zone string vulnerability finding exception reason finding vulnerability finding exception reason string vulnerability finding exception reference finding vulnerability finding exception reference array vulnerability finding grouping id finding vulnerability finding grouping id string vulnerability finding hostnames finding vulnerability finding hostnames array vulnerability finding ip addresses finding vulnerability finding ip addresses array vulnerability finding last enriched finding vulnerability finding last enriched string vulnerability finding last ingested finding vulnerability finding last ingested string vulnerability finding mac addresses finding vulnerability finding mac addresses array vulnerability finding mitre attack techniques finding vulnerability finding mitre attack techniques string vulnerability finding primary asset identifier finding vulnerability finding primary asset identifier string vulnerability finding primary asset type finding vulnerability finding primary asset type string vulnerability finding raw json finding vulnerability finding raw json string vulnerability finding raw risk score finding vulnerability finding raw risk score integer vulnerability finding remediation owner finding vulnerability finding remediation owner string vulnerability finding remediation status finding vulnerability finding remediation status string vulnerability finding remediation finding vulnerability finding remediation string vulnerability finding scan id finding vulnerability finding scan id string vulnerability finding scan type finding vulnerability finding scan type string vulnerability finding sources finding vulnerability finding sources array vulnerability finding summary finding vulnerability finding summary string vulnerability finding turbine risk score finding vulnerability finding turbine risk score integer vulnerability finding unique id finding vulnerability finding unique id string vulnerability finding unique id type finding vulnerability finding unique id type string vulnerability first exploit published finding vulnerability first exploit published string vulnerability id finding vulnerability id string vulnerability in known exploited vulnerabilities finding vulnerability in known exploited vulnerabilities string vulnerability last modified date finding vulnerability last modified date string vulnerability max exploit maturity finding vulnerability max exploit maturity string vulnerability public exploit found finding vulnerability public exploit found string vulnerability published date finding vulnerability published date string vulnerability references finding vulnerability references string vulnerability related attack patterns finding vulnerability related attack patterns string vulnerability reported exploitation finding vulnerability reported exploitation string vulnerability reported exploited by botnets finding vulnerability reported exploited by botnets string vulnerability reported exploited by ransomware finding vulnerability reported exploited by ransomware string vulnerability reported exploited by threat actors finding vulnerability reported exploited by threat actors string vulnerability reported exploited finding vulnerability reported exploited string vulnerability status finding vulnerability status string vulnerability vulnerable cpes finding vulnerability vulnerable cpes string vulnerability weaknesses (cwes) finding vulnerability weaknesses cwes string vulnerability weaponized exploit found finding vulnerability weaponized exploit found string