Fill Vulnerability Details
A vulnerability is a weakness or a defect in the requirements, designs, or implementations of the computational logic found in software and some hardware components that can be directly exploited to negatively impact the confidentiality, integrity, or availability of that system.
Basic Details
Field Name | Required | Description |
---|---|---|
Name | Mandatory | Specify the name of the vulnerability. |
Description | Optional | Specify the additional details and context about the vulnerability. |
Common Fields
Field Name | Description |
---|---|
Tags | Specify the tags for the vulnerability. |
TLP | Specify the TLP, such as RED, AMBER, GREEN, WHITE, and NONE for the vulnerability. |
Created by Reference | Specify the entity that created the STIX object. |
Revoked | Select this option to mark the component as revoked or invalid. |
Custom Attributes
Field name | Description |
---|---|
Add Custom Attributes | Specify the additional information that helps in improving the threat intelligence details. CTIX displays custom attributes created in Administration > Custom Entities Management. You can create multiple custom attributes for the vulnerability. |
External References
Use external references to include any non-STIX information that you may want to associate with this object.
Field Name | Description |
---|---|
Source Name | Enter a source name. |
Description | Enter a description. |
External ID | Enter an external ID. |
URL | Enter the URL of the external reference. |
Hash Type | Select the hash type. |
Hash Value | Enter the hash value. |