Home

Search for Windows Vulnerabilities

Use these tokens to define search criteria for Windows vulnerabilities. Looking for help with writing your query? click here

Vulnerability Tokens

Use these tokens to define search criteria for vulnerabilities.

vulnerabilities.firstFound

vulnerabilities.hostAssetName

vulnerabilities.hostOS

vulnerabilities.found

vulnerabilities.disabled

vulnerabilities.lastFound

vulnerabilities.nonExploitableConfig

vulnerabilities.nonRunningKernel

vulnerabilities.ssl

vulnerabilities.port

vulnerabilities.protocol

vulnerabilities.ignored

vulnerabilities.instance

vulnerabilities.runningService

vulnerabilities.severity

vulnerabilities.status

vulnerabilities.typeDetected

vulnerabilities.vulnerability.authTypes

vulnerabilities.vulnerability.bugTraqIds

vulnerabilities.vulnerability.category

vulnerabilities.vulnerability.compliance.description

vulnerabilities.vulnerability.compliance.section

vulnerabilities.vulnerability.compliance.type

vulnerabilities.vulnerability.consequence

vulnerabilities.vulnerability.cveIds

vulnerabilities.vulnerability.cvss3Info.basescore

vulnerabilities.vulnerability.cvss3Info.temporalScore

vulnerabilities.vulnerability.cvss2Info.accessVector

vulnerabilities.vulnerability.cvss2Info.baseScore

vulnerabilities.vulnerability.cvss2Info.temporalScore

vulnerabilities.vulnerability.discoveryTypes

vulnerabilities.vulnerability.exploitability

vulnerabilities.vulnerability.flags

vulnerabilities.vulnerability.os

vulnerabilities.vulnerability.patchAvailable

vulnerabilities.vulnerability.pci

vulnerabilities.vulnerability.rebootRequired

vulnerabilities.vulnerability.qid

vulnerabilities.vulnerability.sans20Categories

vulnerabilities.vulnerability.solution

vulnerabilities.vulnerability.supportedBy

vulnerabilities.vulnerability.title

vulnerabilities.vulnerability.types

vulnerabilities.vulnerability.vendorRefs

vulnerabilities.vulnerability.vendors.productName

vulnerabilities.vulnerability.vendors.vendorName

vulnerabilities.nonExploitableKernel

vulnerabilities.nonExploitableService

vulnerabilities.vulnerability.patchReleased

vulnerabilities.timesFound

vulnerabilities.vulnerability.kbAge

vulnerabilities.detectionAge

vulnerabilities.vulnerability.description

vulnerabilities.vulnerability.lists

vulnerabilities.vulnerability.patches

vulnerabilities.vulnerability.published

vulnerabilities.vulnerability.risk

vulnerabilities.vulnerability.qualysPatchable

vulnerabilities.vulnerability.criticality

vulnerabilities.vulnerability.updated

 

RTIs

Use these tokens for searching Real-Time Threat Indicator (RTI) related vulnerabilities.
 


vulnerabilities.vulnerability.threatIntel.activeAttacks

vulnerabilities.vulnerability.threatIntel.denialOfService

vulnerabilities.vulnerability.threatIntel.easyExploit

vulnerabilities.vulnerability.threatIntel.exploitKit

vulnerabilities.vulnerability.threatIntel.exploitKitName

vulnerabilities.vulnerability.threatIntel.highDataLoss

vulnerabilities.vulnerability.threatIntel.highLateralMovement

vulnerabilities.vulnerability.threatIntel.malware

vulnerabilities.vulnerability.threatIntel.malwareName

vulnerabilities.vulnerability.threatIntel.noPatch

vulnerabilities.vulnerability.threatIntel.publicExploit

vulnerabilities.vulnerability.threatIntel.publicExploitName

vulnerabilities.vulnerability.threatIntel.zeroDay

vulnerabilities.vulnerability.threatIntel.wormable

vulnerabilities.vulnerability.threatIntel.predictedHighRisk

vulnerabilities.vulnerability.threatIntel.unauthenticatedExploitation

vulnerabilities.vulnerability.threatIntel.remoteCodeExecution

vulnerabilities.vulnerability.threatIntel.ransomware

vulnerabilities.vulnerability.threatIntel.privilegeEscalation

vulnerabilities.vulnerability.threatIntel.solorigateSunburst