This document describes the data structure of our Security Advisory documents. These advisories are extracted from trusted sources and contain detailed, structured information about discovered or patched vulnerabilities affecting software or hardware products.
Field | Type | Description |
|
| Short description of the advisory. |
|
| Title of the source advisory or article. |
|
| Date when the advisory was first published. |
|
| Date of last update from the source. |
|
| When our system collected the data. |
|
| Link to the original advisory or page. |
|
| Name of the organization publishing the advisory. |
|
| Version or revision information (if available). |
|
| Always set to this value for this document type. |
Field | Type | Description |
|
| CVE identifiers related to the advisory. |
|
| Remediation or workaround details. |
|
| Affected products (flat list). |
|
| Vendor of the affected product(s). |
|
| List of related references and URLs. |
|
| The severity rating from the vendor. |
This section provides a structured breakdown of affected components as extracted and normalized by AI.
"product_features": [{"vendor": "Fortinet","product": "FortiOS","version": ["7.2.0", "7.2.1", "7.2.2"],"criterias": {"operator": "AND","criterion": ["< 7.2.5",">= 7.2.0"]},"resolution": {"product_fix": ["7.2.5"],"other_fix": ["Mitigation guidance available"]},"meta_data": [{"source_snippet": "FortiOS versions before 7.2.5 are affected","confidence": "high"}]}]
Each entry contains:
vendor
: Name of the vendor.
product
: Product name.
version
: List of explicitly affected versions.
criterias
: Object with logical operator and individual version constraints.
resolution
: Fix information separated into product-specific and alternative fixes.
meta_data
: Array of metadata objects, such as source evidence and confidence level.
If severity is provided by the vendor or third parties:
"severities": [{"origin_name": "Vendor Advisory","severity": "Critical"}]
If a CVE includes CVSS scoring metadata:
"cvss": [{"cve_id": "CVE-2024-12345","cvss_version": "3.1","cvss_risk_assessment": "High","cvss_score": {"value": 7.8,"label": "High"},"cvss_vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","parsed_cvss_vector": {"Attack Vector": "Network","Attack Complexity": "Low","Privileges Required": "None","User Interaction": "None","Scope": "Unchanged","Confidentiality": "High","Integrity": "High","Availability": "High"}}]
Use classification == "Security Advisory"
to detect relevant documents.
Parse cvss_vector
or use cvss_score.label
for risk level.
vulnerable_products
is a flat list for fast filtering.
The solution
field is always present, even if only to state "no fix available".
Dates follow ISO 8601 format (e.g., 2025-06-01T12:00:00Z
).