Vulnerabilities
The Vulnerabilities page lets you manage the vulnerabilities for Threat Intelligence.
Vulnerabilities are assigned to each node, depending on the installed hardware, operating system (OS), and the software identified in the traffic. The software uses Common Vulnerabilities and Exposures (CVE) , a dictionary that gives definitions for publicly-disclosed cybersecurity vulnerabilities and exposures.
Live / refresh
The Live icon lets you change live view on, or off. When live mode is on, the page will refresh approximately every five seconds.
Add
This lets you add a new vulnerability.