Vulnerability integrations Vulnerability integrations provide the ability for customers and vendors to enrich the vulnerability data on their instance by retrieving data from external systems and vendors. This ability can simplify the vulnerability remediation life cycle by keeping the instance synchronized with other vulnerability management systems. Define a new vulnerability integrationA vulnerability integration is a process that pulls report data from a third-party system, generally to retrieve vulnerability data, and process that reporting data using data sources or a custom processor.Vulnerability integration scriptOn the Vulnerability Integration form, the integration script is a reference to a script include that extends the VulnerabilityIntegrationBase script include. Report processor strategiesThe Report processor strategy field on the Vulnerability Integration form is used to select the method to process the data returned by the vulnerability integration script when the vulnerability integration process is executed. Integration factory script fieldsThe Vulnerability Integration form contains the integration factory script and, when the Custom Report Processor report processor strategy is selected, the Processor factory script. These fields are used to provide the logic to actually instantiate the object defined by the script include reference fields, Integration script, and Report processor, respectively.Pushing data to a vulnerability integration using a REST APIYou can use a REST endpoint to push data to a vulnerability integration.Manually running a vulnerability integrationA vulnerability integration is configured to run on a scheduled basis. However, you can run them manually when needed.