Vulnerability Icons

Icons are used in the Vulnerability KnowledgeBase and in vulnerability details throughout the application to identify certain vulnerability attributes. These icons are described below.

 

ICON

NAME

DESCRIPTION

ico_pencil.gif

Edited

Indicates that the vulnerability was edited. The content (Threat, Impact and Solution) and/or the severity level may have been changed by a Manager user. Note that any field that has been edited can no longer be updated automatically by the service.

ico_remote_discovery.gif

Remote Discovery

Indicates that the vulnerability can be detected using remote (unauthenticated) scanning.

ico_key.gif

Authenticated Discovery

Indicates that authenticated scanning may be required to detect this vulnerability. If the discovery method is Authenticated Only, then authenticated scanning is required for detection. If the discovery method is Remote or Authenticated, then remote scanning or authenticated scanning is required for detection. Hover your mouse pointer over the key to see the authentication technology type(s) for the vulnerability.

ico_patch_available.gif

Patch Available

Indicates that a patch is currently available from the vendor. Refer to the Solution section of the vulnerability details for more information. Note that you can use the Search functionality in the KnowledgeBase to find all vulnerabilities that have or do not have an available patch.

ico_exploit.gif

Exploit Available

Indicates that exploitability information is available for this vulnerability. The service correlates exploitability information with service-detected vulnerabilities when known exploits are published by third party vendors and/or publicly available sources. The service constantly correlates exploitability information from real-time feeds to provide up to date references to exploits and related security resources.

ico_malware.gif

Associated Malware

Indicates that malware is associated with this vulnerability. The service correlates malware information with vulnerabilities when malware threats for vulnerabilities are published within the Trend Micro Threat Encyclopedia. The service constantly correlates malware information obtained from Threat Encyclopedia real-time feeds to provide up to date references to exploits and related security resources.