Our vulnerability monitor checks publicly exposed Internet assets to see if the asset is running out of date software that’s known to be vulnerable. We conduct a port scan then check any exposed services for their software version to see if the asset is known to be vulnerable.
If we find vulnerabilities, our scanner will return results using data from the National Vulnerability Database, a government-backed industry-standard data set for vulnerability information.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article