Name | Type | Description | Notes |
---|---|---|---|
key | str | The identifier or name of the exploit that was used to validate the vulnerability. | [optional] |
name | str | The name of the source used to validate the vulnerability. | [optional] |
This repository has been archived by the owner on Sep 10, 2024. It is now read-only.