Legacy - Exploit Intelligence Service
Our legacy product, the Exploit Intelligence Service (EIS), generates a json file including the following fields. Reach out if you are a user of EIS and we will help you transition your workflows to the new API.
Data Dictionary
| Field Name | Data Type | Description | Notes |
|---|---|---|---|
| string | The CVE identifier as assigned in the Mitre CVE List. | Format: CVE-YYYY-XXXX |
| string | The date when Mitre published the CVE on their CVEList | date |
| string | The date when this CVE was last modified by Mitre | date |
| string | The date when Mitre reserved the CVE on their CVEList, not entirely trustworthy date before 2022. | date |
| string | The date when NVD published the CVE | |
| string | The date when NVD last modified this CVE | |
| string | CVE Description | |
| string, null | Common weakness enumeration - CWE | |
| array of strings | normalized tags extracted from text descriptions of this CVE | |
| array of strings | extracted and descriptive text that represent an outcome of exploitations | |
| array of strings | extracted and descriptive text that represent the actions an attacker may take during exploitations | |
| array of strings | extracted and descriptive text that represent the attacker and any qualifications | |
| array of strings | extracted and descriptive text that represent the weakness in the target | |
| array of strings | extracted and descriptive text that represent any prerequisite in the defenders environment that must exist prior to exploitation | |
| array of strings | extracted and descriptive text that represent the delivery of an exploitation (pdf file, crafted HTML, etc) | |
| array of strings | STRIDE values derived from vulnerability attributes | |
| string | description/classification of the url | |
| string | URL reference | |
| string [“h”,”o”,”a”] | type of platform, (h)ardware, (o)perating system or (a)pplication | |
| string | vulnerable vendor for this CVE | |
| string | vulnerable product from associated vendor | |
| string | version of EPSS generating this score | |
| number | The EPSS score, probability of exploitation | |
| number | the ranked percentile of this score among all scored CVEs | |
| |||
| |||
| |||
| |||
| |||
| |||
| |||
| |||
| |||
| |||
| github repo: https://github.com/ | ||
| number | likelihood the repository contains an exploit | ML Model |
| string | date time the repo was first created | |
| string | if a file exists specifically mentioning this CVE, this is the date and time file was created | |
| string | typically only if the repo has been removed | |
| string | short name of the module | |
| string | ||
| string | text description from the module | |
| date the module was first published | ||
| string | last modification date/time for the module | |
| string | url to exploit db page | |
| |||
| |||
| |||
| |||
| string | tool/software where CVE mapping was identified | |
| string | when cve was added to tool/software | |
| string | when cve component was last modified | |
| string | Group name associated with this vulnerability | |
| string | Alias for the group name | |
| string | Source of the group name alias |