The Exploits tab shows all the exploits associated with the vulnerabilities of the threat.
The Exploits grid displays the following columns:
- Source: The database that supplies the exploit.
- Identifier: The identifying number assigned to the exploit.
- Name: The name of the exploit.
- Description: A brief description of the exploit.
- Platform: The type of operating system this exploit affects.
- Type: The type of exploit.
- CVEs: The CVE associated with the exploit.
- Vuln Instances: How many vulnerabilities the exploit appears in.
- Date Published: Number of vulnerability instances that are associated with the vulnerabilities