Kaspersky Endpoint Security 10 for Windows

About the list of vulnerabilities

22 December 2022

ID 128110

Kaspersky Endpoint Security logs the results of the Vulnerability Scan task in the list of vulnerabilities.

After you review specific vulnerabilities and perform the actions that are recommended to fix them, Kaspersky Endpoint Security changes the status of the vulnerabilities to Fixed.

If you do not want to display entries about specific vulnerabilities in the vulnerability list, you may choose to hide these entries. Kaspersky Endpoint Security assigns such vulnerabilities Hidden status.

The list of vulnerabilities appears in the form of a table. Each table row contains the following information:

  • An icon that signifies the vulnerability severity level. The following criticality levels of vulnerabilities exist:
    • Icon critical_event.bmpCritical. This severity level applies to highly dangerous vulnerabilities that must be fixed without delay. Intruders actively exploit vulnerabilities of this level to infect the computer operating system or access the user's personal data. Kaspersky recommends that you promptly take all steps needed to fix vulnerabilities of the “Critical” severity level.
    • Icon important_event.bmp. Important. This severity level applies to important vulnerabilities that need to be fixed soon. Intruders can actively exploit vulnerabilities of this level. Intruders do not currently actively exploit vulnerabilities of the “Important” severity level. Kaspersky recommends that you promptly take all steps needed to fix vulnerabilities of the “Important” severity level.
    • Icon inquiry_event.bmpWarning. This severity level applies to vulnerabilities for which fixing may be postponed. However, such vulnerabilities may threaten the computer's security in the future.
  • Vulnerability ID.
  • Name of application in which the vulnerability is detected.
  • Brief description of the vulnerability.
  • Information about the software publisher, as indicated in the digital signature.
  • Result of actions taken to fix the vulnerability.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.