Name | Type | Description | Notes |
---|---|---|---|
key | str | The identifier or name of the exploit that was used to validate the vulnerability. | [optional] |
name | str | The name of the source used to validate the vulnerability. | [optional] |
Name | Type | Description | Notes |
---|---|---|---|
key | str | The identifier or name of the exploit that was used to validate the vulnerability. | [optional] |
name | str | The name of the source used to validate the vulnerability. | [optional] |