Exploits

The Exploits tab.

The Exploits tab shows all the exploits associated with the vulnerabilities of the threat.

The Exploits grid displays the following columns:

  • Source: The database that supplies the exploit.
  • Identifier: The identifying number assigned to the exploit.
  • Name: The name of the exploit.
  • Description: A brief description of the exploit.
  • Platform: The type of operating system this exploit affects.
  • Type: The type of exploit.
  • CVEs: The CVE associated with the exploit.
  • Vuln Instances: How many vulnerabilities the exploit appears in.
  • Date Published: Number of vulnerability instances that are associated with the vulnerabilities