Vulnerability Categories
The Vulnerability Intelligence page breaks down key vulnerabilities from Tenable's database into curated categories that you select from hexagon-shaped tiles.
While most vulnerabilities do not belong to categories, the ones that do require quick action when found in your environment! To learn how to compare your findings to one of these categories, see Identify Your Exposure.
You can choose from the following categories.
Category |
Description |
---|---|
Emerging Threats |
Vulnerabilities being actively monitored by Tenable in three areas:
|
CISA Known Exploited |
Vulnerabilities that appear in the CISA Known Exploited Vulnerabilities Catalog. CISA suggests that you prioritize remediation efforts for these vulnerabilities since they are known to cause immediate harm. |
In the News |
Vulnerabilities being widely reported in the press with notable coverage over the past 30 days. |
Recently Actively Exploited |
Vulnerabilities with notable coverage in the press over the past 30 days, and for which Tenable has evidence of active exploitation. |
Ransomware |
Vulnerabilities used in current or historical ransomware attacks, as determined from evidence gathered by the Tenable Research team. |
Persistently Exploited |
Vulnerabilities being leveraged by threat actors over an extended period of time in targeted attacks, ransomware, or malware campaigns. These vulnerabilities are manually curated by the Tenable Research team. |
Top 50 VPR |
The top 50 vulnerabilities by Vulnerability Priority Rating (VPR). |