Skip to main content

Cyware Threat Intelligence eXchange

Fill Vulnerability Details

A vulnerability is a weakness or a defect in the requirements, designs, or implementations of the computational logic found in software and some hardware components that can be directly exploited to negatively impact the confidentiality, integrity, or availability of that system.

Basic Details

Field Name

Required

Description

Name

Mandatory

Specify the name of the vulnerability.

Description

Optional

Specify the additional details and context about the vulnerability.

Common Fields

Field Name

Description

Tags

Specify the tags for the vulnerability.

TLP

Specify the TLP, such as RED, AMBER, GREEN, WHITE, and NONE for the vulnerability.

Created by Reference

Specify the entity that created the STIX object.

Revoked

Select this option to mark the component as revoked or invalid.

Custom Attributes

Field name

Description

Add Custom Attributes

Specify the additional information that helps in improving the threat intelligence details. CTIX displays custom attributes created in Administration > Custom Entities Management. You can create multiple custom attributes for the vulnerability.

External References

Use external references to include any non-STIX information that you may want to associate with this object.

Field Name

Description

Source Name

Enter a source name.

Description

Enter a description.

External ID

Enter an external ID.

URL

Enter the URL of the external reference.

Hash Type

Select the hash type.

Hash Value

Enter the hash value.