The following icons are used in the KnowledgeBase and in vulnerability details throughout the application to identify certain vulnerability attributes.
Icon |
Name |
Description |
Edited |
Indicates that the vulnerability was edited. The content (Threat, Impact and Solution) and/or the severity level may have been changed by a Manager user. Note that any field that has been edited can no longer be updated automatically by the service. |
|
Remote Discovery |
Indicates that the vulnerability can be detected using remote (unauthenticated) scanning. |
|
Authenticated Discovery |
Indicates that authenticated scanning may be required to detect this vulnerability. If the discovery method is Authenticated Only, then authenticated scanning is required for detection. If the discovery method is Remote or Authenticated, then remote scanning or authenticated scanning is required for detection. Hover your mouse pointer over the key to see the authentication technology type(s) for the vulnerability. |
|
Patch Available |
Indicates that a patch is currently available from the vendor. Refer to the Solution section of the vulnerability details for more information. Note that you can use the Search functionality in the KnowledgeBase to find all vulnerabilities that have or do not have an available patch. |
|
Exploit Available |
Indicates that exploitability information is available for this vulnerability. The service correlates exploitability information with service-detected vulnerabilities when known exploits are published by third party vendors and/or publicly available sources. The service constantly correlates exploitability information from real-time feeds to provide up to date references to exploits and related security resources. |
|
Associated Malware |
Indicates that malware is associated with this vulnerability. The service correlates malware information with vulnerabilities when malware threats for vulnerabilities are published within the Trend Micro Threat Encyclopedia. The service constantly correlates malware information obtained from Threat Encyclopedia real-time feeds to provide up to date references to exploits and related security resources. |
|
Not exploitable due to configuration |
Indicates that this QID may be filtered out of reports when the report filter "Exclude QIDs not exploitable due to configuration" is selected. This filter appears in scan reports, patch reports and scorecard reports. |
|
Non-running services |
Indicates that this QID may be filtered out of reports when the report filter "Exclude non-running services" is selected. This filter appears in scan reports, patch reports and scorecard reports. |