Vulnerabilities

The Vulnerabilities page lets you manage the vulnerabilities for Threat Intelligence.

Figure 1. Vulnerabilities page

Vulnerabilities page

Vulnerabilities are assigned to each node, depending on the installed hardware, operating system (OS), and the software identified in the traffic. The software uses Common Vulnerabilities and Exposures (CVE) , a dictionary that gives definitions for publicly-disclosed cybersecurity vulnerabilities and exposures.

Live / refresh

The Live icon lets you change live view on, or off. When live mode is on, the page will refresh approximately every five seconds.

Add

This lets you add a new vulnerability.