Exploit Database Connector Overview

In order for the Exploits grid to provide users with information, it must first be populated with data. Resolver RiskVision uses the Exploit Database connector to achieve this purpose. Once a day, this connector automatically accesses the Exploit Database and downloads the data into a customer-specific CSV file. This file is imported back into RiskVision and used to populate the Exploits grid.

In addition to downloading information from the Exploit Database, the connector also correlates this data to its corresponding vulnerability, making it easy for users to identify any weaknesses. It also factors into the risk scoring of vulnerabilities to help users prioritize which vulnerabilities should be addressed first.