
"I am using/have <software | protocol | etc>, what attack patterns am I susceptible to?"
E.g., I am using the SSL protocol, what attack patterns am I susceptible to?
"What are the most recent vulnerabilities that target the software and how can I detect it?"
E.g., What are the most recent vulnerabilities that target the software log4j and how can I detect it?
"What is the weakness associated with the vulnerability and how are attack patterns trying to exploit it?"
E.g., What is the weakness associated with the log4j vulnerability and how are attack patterns trying to exploit it?
"What attack patterns am I susceptible to if ?
E.g., What attack patterns am I susceptible to if the internal state of my product is revealed through the response to a query?