With Vulnerability Response, you
can compare vulnerability data to CIs and software identified in the Asset Management module. The vulnerability data
can be imported from internal and external sources, such as the National Vulnerability Database.
You can also use Common Weakness Enumeration (CWE) records downloaded from the CWE database for
reference when deciding whether to escalate a vulnerability.
For detailed import instructions, see NVD and CWE updates.