The Vulnerabilities tab allows you to search for and research vulnerabilities, track trending threats, and verify assessment coverage across your environment.
The Vulnerabilities tab in Threat Intelligence Hub provides a searchable database
of vulnerabilities, enabling security teams to discover trending threats, research
severity and exploitability, and verify assessment coverage across TrendAI Vision One™.
Vulnerability data updates in real time, ensuring you have access to the latest threat
intelligence to help prioritize remediation based on both global threat intelligence
and your specific risk profile.
To access the Vulnerabilities tab, go to and click Vulnerabilities.
|
Action
|
Description
|
|
Access the entire vulnerability database.
|
The Total tab shows all vulnerabilities in the database. You can search for specific vulnerabilities and apply filters to narrow the results. Trending vulnerabilities appear at the top of the table by
default.
You can easily see the following information about each vulnerability:
|
|
Show vulnerabilities with available exploits.
|
The Exploit available tab filters the database for vulnerabilities with a known exploit code. This includes
vulnerabilities such as proofs-of-concept and mature exploitation toolkits.
|
|
Show recently exploited vulnerabilities.
|
The Actively exploited tab refines the table to just those vulnerabilities that threat actors are actively
using or preparing for use. This list includes vulnerabilities that trusted sources
report as
exploited in-the-wild. |
|
View only zero-day vulnerabilities.
|
The Zero-day tab lists only zero-day vulnerabilities including undisclosed vulnerabilities discovered
by Zero Day Initiative researchers and publicly reported zero‑days that do not yet
have a CVE.
|
|
Narrow the list of vulnerabilities.
|
Select options to display vulnerabilities with specific criteria:
|
|
Search the vulnerabilities database.
|
Find specific vulnerabilities using any of the following criteria:
|
|
Apply filters to the table.
|
|
|
Review vulnerability details.
|
Click the ID to display the vulnerability profile.
|
