Vulnerability Categories

The Vulnerability Intelligence page breaks down key vulnerabilities from Tenable's database into curated categories that you select from hexagon-shaped tiles.

While most vulnerabilities do not belong to categories, the ones that do require quick action when found in your environment! To learn how to compare your findings to one of these categories, see Identify Your Exposure.

You can choose from the following categories.

Category

Description

Emerging Threats

Vulnerabilities being actively monitored by Tenable in three areas:

  • Vulnerabilities Being Monitored — Publicly discussed, but no exploit or proof of concept has been disclosed.

  • Vulnerabilities of Interest — Publicly discussed and have a proof of concept that could lead to widespread use by attackers.

  • Vulnerabilities of Concern — Widely discussed and large-scale abuse by attackers is being observed.

CISA Known Exploited

Vulnerabilities that appear in the CISA Known Exploited Vulnerabilities Catalog. CISA suggests that you prioritize remediation efforts for these vulnerabilities since they are known to cause immediate harm.

In the News

Vulnerabilities being widely reported in the press with notable coverage over the past 30 days.

Recently Actively Exploited

Vulnerabilities with notable coverage in the press over the past 30 days, and for which Tenable has evidence of active exploitation.

Ransomware

Vulnerabilities used in current or historical ransomware attacks, as determined from evidence gathered by the Tenable Research team.

Persistently Exploited

Vulnerabilities being leveraged by threat actors over an extended period of time in targeted attacks, ransomware, or malware campaigns. These vulnerabilities are manually curated by the Tenable Research team.

Top 50 VPR

The top 50 vulnerabilities by Vulnerability Priority Rating (VPR).