Views:

The Vulnerabilities tab allows you to search for and research vulnerabilities, track trending threats, and verify assessment coverage across your environment.

The Vulnerabilities tab in Threat Intelligence Hub provides a searchable database of vulnerabilities, enabling security teams to discover trending threats, research severity and exploitability, and verify assessment coverage across TrendAI Vision One™.
Vulnerability data updates in real time, ensuring you have access to the latest threat intelligence to help prioritize remediation based on both global threat intelligence and your specific risk profile.
To access the Vulnerabilities tab, go to Threat IntelligenceThreat Intelligence Hub and click Vulnerabilities.
Action
Description
Access the entire vulnerability database.
The Total tab shows all vulnerabilities in the database. You can search for specific vulnerabilities and apply filters to narrow the results. Trending vulnerabilities appear at the top of the table by default.
You can easily see the following information about each vulnerability:
  • Vulnerability ID: The unique identifier assigned to a vulnerability to consistently reference and track it across vendors, tools, and security databases
  • Trending: Indicates significant vulnerability activity based on exploit availability, severity, community attention, and other threat indicators
  • CVSS v3.1: An international standard for measuring the severity of security vulnerabilities in software and systems; FAQ here
  • Affected vendors: The companies that develop or maintain products that contain a specific vulnerability
  • Affected products: The software, services, platforms, or components that contain a specific vulnerability
  • Exploit available: Whether a known exploit code exists for this vulnerability
  • Assessment coverage: Whether Cyber Risk Exposure Management assessments can detect the vulnerability in your environment
  • Global exploit potential: Uses multiple trusted sources to verify Known Exploited Vulnerabilities (KEV) status and exploitation level, then ranks vulnerabilities by exploit likelihood and severity impact.
  • Description: A summary of the exploitability and potential impact using standardized CVSS metrics
  • Published date: How recently an authoritative source disclosed the vulnerability to the public in YYYY-MM-DD format
  • Exploit available date: When a functional exploit for the vulnerability became publicly known or accessible in YYYY-MM-DD format
  • Last updated: When the vulnerability record was most recently modified to reflect new or revised information in YYYY-MM-DD format
  • Vulnerability type: The kind of vulnerability
Show vulnerabilities with available exploits.
The Exploit available tab filters the database for vulnerabilities with a known exploit code. This includes vulnerabilities such as proofs-of-concept and mature exploitation toolkits.
Show recently exploited vulnerabilities.
The Actively exploited tab refines the table to just those vulnerabilities that threat actors are actively using or preparing for use. This list includes vulnerabilities that trusted sources report as exploited in-the-wild.
View only zero-day vulnerabilities.
The Zero-day tab lists only zero-day vulnerabilities including undisclosed vulnerabilities discovered by Zero Day Initiative researchers and publicly reported zero‑days that do not yet have a CVE.
Narrow the list of vulnerabilities.
Select options to display vulnerabilities with specific criteria:
Search the vulnerabilities database.
Find specific vulnerabilities using any of the following criteria:
  • Vulnerability ID
    • Common Vulnerabilities and Exposures (CVE) ID
    • Zero Day Initiative (ZDI) ID
  • Vendor name
  • Product name
Apply filters to the table.
  1. Click Add filter.
  2. Select a filter:
    • Exploit available date: Filter on when the exploit code became available:
      • Last 24 hours
      • Last 7 days
      • Last 30 days
      • Last 90 days
      • Custom period (Date)
    • Global exploit potential: Filter by exploit availability and active use:
      • Actively exploited: Threat actors are currently using exploits in real‑world attacks.
      • High: Threat actors are likely to leverage known, readily available exploits.
      • Low: Threat actors have not widely adopted exploits, which remain limited or theoretical.
    • Last updated: Select the update time range:
      • Last 24 hours
      • Last 7 days
      • Last 30 days
      • Last 90 days
      • Custom period (Date)
    • Published date: Choose how recently the vulnerability was published:
      • Last 24 hours
      • Last 7 days
      • Last 30 days
      • Last 90 days
      • Custom period (Date)
    • Trending: Filter vulnerabilities based on significant activity, including exploit availability, severity, community attention, and other threat indicators.
      • Yes: Vulnerability is currently trending
      • No: Vulnerability is not currently trending
    • Vulnerability type: Display only CVE or ZDI vulnerabilities.
  3. Configure filter criteria. Filters apply immediately.
Review vulnerability details.
Click the ID to display the vulnerability profile.