View Vulnerability Details 

Each vulnerability in the KnowledgeBase is assigned an ID (QID). Additional information for classification and tracking is provided.

Entry Details 

The Entry Details section provides the following details of KnowledgeBase entry:

- Basic information, such as assigned ID, type, severity of the vulnerability, category, authentication, and discovery method.

For details, see Severity levels | Vulnerability Categories | Discovery Method | Malware

Vendor and Software

The Vendor & Software section lists the associated software products and vendors affected by the selected vulnerability. 

Threat

The Threat section lists the threat or what this vulnerability exploits. It describes the security threat associated with the vulnerability

Impact

The Impact section presents the impact and the risk that is posed because of the selected vulnerability. It describes the possible consequences that may occur if the vulnerability is successfully exploited.

Solution

The Solution section provides a suggested solution to fix the vulnerability. This may include a link to a patch, update, the vendor's Web site, or a workaround.

Exploitability

This Exploitability section lists known exploits available from third-party vendors and/or publicly available sources for the selected vulnerability. For details, see Exploitability.

Malware

The Malware tab provides details of the known malware for the selected vulnerability. For details, see Malware.

Compliance

The Compliance section lists compliance-related information, that is, if the selected vulnerability is associated with any government or industry-specific regulations or information technology standards.  For details, see Compliance Definitions.

Action Logs

The Action Logs section lists the changes made to the selected vulnerability entry. For example, a change in description, severity, solution, and so on. 

Related topics

Tell me about Severity levels.