Hi YuriDiogenes.
1st of all, thank you for your contribution, it was highly appreciated.
Regarding the script, in my case, i think Microsoft updated recently the display name, so searching on the strings will return nothing.
Here is the script updated for less watchful people 
securityresources
| where type == "microsoft.security/assessments"
| where * contains "Vulnerabilities in your virtual machines"
| summarize by assessmentKey=name //the ID of the assessment
| join kind=inner (
securityresources
| where type == "microsoft.security/assessments/subassessments"
| extend assessmentKey = extract(".*assessments/(.+?)/.*",1, id)
) on assessmentKey
| project assessmentKey, subassessmentKey=name, id, parse_json(properties), resourceGroup, subscriptionId, tenantId
| extend description = properties.description,
displayName = properties.displayName,
resourceId = properties.resourceDetails.id,
resourceSource = properties.resourceDetails.source,
category = properties.category,
severity = properties.status.severity,
code = properties.status.code,
timeGenerated = properties.timeGenerated,
remediation = properties.remediation,
impact = properties.impact,
vulnId = properties.id,
additionalData = properties.additionalData