Vulnerability Icons

The following icons are used in the KnowledgeBase and in vulnerability details throughout the application to identify certain vulnerability attributes.

Icon

Name

Description

Vulnerability Icon: Edited Vulnerability

Edited

Indicates that the vulnerability was edited. The content (Threat, Impact and Solution) and/or the severity level may have been changed by a Manager user. Note that any field that has been edited can no longer be updated automatically by the service.

Vulnerability Icon: Remote Discovery

Remote Discovery

Indicates that the vulnerability can be detected using remote (unauthenticated) scanning.

Vulnerability Icon: Authenticated Discovery

Authenticated Discovery

Indicates that authenticated scanning may be required to detect this vulnerability. If the discovery method is Authenticated Only, then authenticated scanning is required for detection. If the discovery method is Remote or Authenticated, then remote scanning or authenticated scanning is required for detection. Hover your mouse pointer over the key to see the authentication technology type(s) for the vulnerability.

Vulnerability Icon: Patch Available

Patch Available

Indicates that a patch is currently available from the vendor. Refer to the Solution section of the vulnerability details for more information. Note that you can use the Search functionality in the KnowledgeBase to find all vulnerabilities that have or do not have an available patch.

Vulnerability Icon: Exploit Available

Exploit Available

Indicates that exploitability information is available for this vulnerability. The service correlates exploitability information with service-detected vulnerabilities when known exploits are published by third party vendors and/or publicly available sources. The service constantly correlates exploitability information from real-time feeds to provide up to date references to exploits and related security resources.

Vulnerability Icon: Associated Malware

Associated Malware

Indicates that malware is associated with this vulnerability. The service correlates malware information with vulnerabilities when malware threats for vulnerabilities are published within the Trend Micro Threat Encyclopedia. The service constantly correlates malware information obtained from Threat Encyclopedia real-time feeds to provide up to date references to exploits and related security resources.

Vulnerability Icon: Not exploitable due to configuration

Not exploitable due to configuration

Indicates that this QID may be filtered out of reports when the report filter "Exclude QIDs not exploitable due to configuration" is selected. This filter appears in scan reports, patch reports and scorecard reports.

Vulnerability Icon: Non-running services

Non-running services

Indicates that this QID may be filtered out of reports when the report filter "Exclude non-running services" is selected. This filter appears in scan reports, patch reports and scorecard reports.