Home

Discovery method

You can identify the discovery methods used for detecting the various vulnerabilities in the KnowledgeBase. Each vulnerability in the KnowledgeBase is assigned one of these discovery methods: Remote Only, Authenticated Only, or Remote or Authenticated.

This tells you the scanning method required to discover the vulnerability. This may be:

- Remote only (remote unauthenticated scanning is required for detection)

- Authenticated Only (authenticated scanning is required for detection)

- Remote and Authenticated (remote scanning or authenticated scanning is required for detection)

Remote Only Discovery Method

This method is assigned when you see the vulnerability has the remote discovery icon  without the authenticated discovery icon . This means the vulnerability can be detected by remote, unauthenticated scanning.

Authenticated Only Discovery Method

This method is assigned when you see the vulnerability has the authenticated discovery icon without the remote discovery icon . This means the vulnerability can only be detected using authenticated scanning.

Remote or Authenticated Discovery Method

This method is assigned when you see the vulnerability has the authenticated discovery icon and the remote discovery icon . This means the vulnerability can be detected by remote discovery OR authenticated discovery. Only one of these methods is required for vulnerability detection.