Vulnerabilities

When you select KnowledgeBase from the left menu, the vulnerabilities list appears. Our KnowledgeBase of vulnerabilities is the largest in the industry. Multiple sources are employed in updating the KnowledgeBase, including the research of our own Security Engineers. A complete list of vulnerabilities performed by the scanning engine is available to you at all times. This includes vulnerabilities, potential vulnerabilities, and information gathered.

New. The New menu enables Managers to add OVAL vulnerability definitions to the KnowledgeBase making them available for scanning. The service supports OVAL vulnerability definitions for Windows registry tests, Windows file tests and compound tests, which are Boolean combinations of other tests. See Adding OVAL Vulnerabilities for complete details.

Search. Use the search functionality to find vulnerabilities by QID, title, user configurations and other criteria. See Vulnerability Search Criteria for information on search options.

View. The View menu enables you to customize the list. You can hide columns, change the sorting criteria and specify the number of rows to appear.

Each column is described below.

Column

Description

Info

Click ico_info.jpg to see vulnerability information, including the category it's assigned to, a description of the threat, the possible impact if exploited, and a solution to resolve the issue.

Edit

Click ico_edit.jpg to change the severity level, edit vulnerability content, and/or disable the vulnerability. Customized settings are global for the subscription and changes will appear to all users in the KnowledgeBase, in scan reports and in remediation tickets. (Note that you cannot edit Web Application vulnerabilities.)

QID

The Qualys ID number assigned to the vulnerability.

Title

The vulnerability title and key vulnerability attributes. For each QID, a group of icons are shown to identify certain vulnerability attributes, such as whether the vulnerability was edited, the discovery method, patch availability and more. Hover your mouse cursor over the group of icons to see a list of the vulnerability attributes represented by the icons. For a full description of the icons, see Vulnerability Icons.

Each QID is assigned a discovery method indicated by these icons:

ico_remote_discovery.gif alone indicates Remote Only discovery. The vulnerability can be detected only using remote (unauthenticated) scanning.

ico_key.gif alone indicates Authenticated Only discovery. The vulnerability can be detected only using authenticated scanning.

ico_remote_discovery.gif andico_key.gif indicates Remote or Authenticated discovery. The vulnerability can be detected using remote scanning or authenticated scanning.

Severity

The severity level assigned to the vulnerability. For more information, including a description of the half red / half yellow severity level, read Severity Levels. For web application vulnerabilities, read WAS Severity Levels.

Category

The category that the vulnerability is assigned to. See Vulnerability Categories for information.

All web application vulnerabilities are assigned to the Web Application category. See Web Application Vulnerabilities for information.

CVE ID

If available, this is a link to the CVE name(s) associated with this vulnerability. CVE (Common Vulnerabilities and Exposures) is a list of common names for publicly known vulnerabilities and exposures. Through open and collaborative discussions, the CVE Editorial board determines which vulnerabilities or exposures are included in CVE.

Vendor Reference

A reference number released by the vendor in regards to the vulnerability, such as a Microsoft Security Bulletin like MS03-046. This may be a link directly to the vendor's web site.

Bugtraq ID

The Bugtraq ID number assigned to the vulnerability by SecurityFocus, a vendor-neutral web site that provides security information to members of the security community. Select the Bugtraq ID to link to the SecurityFocus web site.

CVSS Base

The CVSS Base score assigned to the vulnerability. The Base score measures the fundamental, unchanging qualities of a vulnerability. See CVSS Scoring for information.

Modified

The date the vulnerability was last modified by the service. The service modified date is updated when any of the following attributes have changed: severity level, threat description, impact description, solution description, patch availability, CVSS base score, CVSS temporal score, authentication requirement, or PCI relevance.

Published

The date the vulnerability was added to the KnowledgeBase.