You can identify the discovery methods used for detecting the various vulnerabilities in the KnowledgeBase. Each vulnerability in the KnowledgeBase is assigned one of these discovery methods: Remote Only, Authenticated Only, or Remote or Authenticated.
This tells you the scanning method required to discover the vulnerability. This may be:
- Remote only (remote unauthenticated scanning is required for detection)
- Authenticated Only (authenticated scanning is required for detection)
- Remote and Authenticated (remote scanning or authenticated scanning is required for detection)
This method is assigned when you see the vulnerability has the remote discovery icon without the authenticated discovery icon . This means the vulnerability can be detected by remote, unauthenticated scanning.
This method is assigned when you see the vulnerability has the authenticated discovery icon without the remote discovery icon . This means the vulnerability can only be detected using authenticated scanning.
This method is assigned when you see the vulnerability has the authenticated discovery icon and the remote discovery icon . This means the vulnerability can be detected by remote discovery OR authenticated discovery. Only one of these methods is required for vulnerability detection.