get_vex_status
Retrieve VEX status for a specific CVE ID and optionally a product to assess vulnerability impact and exploitability, providing vendor statements and false positive insights.
Instructions
Check VEX vulnerability status for specific products
Input Schema
Name | Required | Description | Default |
---|---|---|---|
cve_id | Yes | Check Vulnerability Exploitability eXchange (VEX) status for specific products to determine actual impact and exploitability. Provide a CVE ID in format CVE-YYYY-NNNN and optionally a product name (e.g., 'Windows 11', 'RHEL 8', 'Apache HTTP Server'). Returns vendor-provided exploitability statements, false positive filtering, and product-specific impact assessment. | |
product | No | Product name or identifier to check VEX status for (optional). Examples: 'Windows 11', 'RHEL 8', 'Ubuntu 22.04', 'Apache HTTP Server' |
Input Schema (JSON Schema)
{
"properties": {
"cve_id": {
"description": "Check Vulnerability Exploitability eXchange (VEX) status for specific products to determine actual impact and exploitability. Provide a CVE ID in format CVE-YYYY-NNNN and optionally a product name (e.g., 'Windows 11', 'RHEL 8', 'Apache HTTP Server'). Returns vendor-provided exploitability statements, false positive filtering, and product-specific impact assessment.",
"type": "string"
},
"product": {
"description": "Product name or identifier to check VEX status for (optional). Examples: 'Windows 11', 'RHEL 8', 'Ubuntu 22.04', 'Apache HTTP Server'",
"type": "string"
}
},
"required": [
"cve_id"
],
"type": "object"
}