Risk Vision is no longer supported; therefore, the Risk Vision Knowledge Base will be shut down on Tuesday, March 31st, 2026.

Exploits

The Exploits tab.

The Exploits tab shows all the exploits associated with the vulnerabilities of the threat.

The Exploits grid displays the following columns:

  • Source: The database that supplies the exploit.
  • Identifier: The identifying number assigned to the exploit.
  • Name: The name of the exploit.
  • Description: A brief description of the exploit.
  • Platform: The type of operating system this exploit affects.
  • Type: The type of exploit.
  • CVEs: The CVE associated with the exploit.
  • Vuln Instances: How many vulnerabilities the exploit appears in.
  • Date Published: Number of vulnerability instances that are associated with the vulnerabilities