exploits

This field contains the exploit information and may include links to exploit code, the exploit code itself, or examples of actions that will exploit the vulnerability.