General

What are the sources used for known exploits?

When the setting Include vulnerabilities with known exploits is turned on, we identify vulnerabilities where known exploits are available in the wild.

For this, we monitor a number of sources of information that are continuously reviewed and used to update our vulnerability tests:

  1. CISA list
    The known Exploited Vulnerabilities Catalog is based on evidence of active exploitation. 
  2. Vulncheck list
    The known Exploited Vulnerabilities Catalog is based on evidence of active exploitation.
  3. ExploitDB
    A repository for exploits and proofs-of-concept.
  4. Metasploit
    Penetration testing platform that enables you to write, test, and execute exploit code.