License Expiration................................................................................................26
About Vulnerabilities ............................................................................................29
Vulnerabilities .............................................................................................30
Signatures ..................................................................................................31
Fingerprints ................................................................................................31
Pre-requisites..............................................................................................31
Packages ....................................................................................................31
Vulnerability Name ..........................................................................................36
Vulnerability Impacts .......................................................................................36
Column Definitions...........................................................................................39
Device Status..................................................................................................39
Updating the Cache..........................................................................................42
About Packages ...................................................................................................43
Using the Packages Tab ........................................................................................44
Working with Packages.........................................................................................51
- IV -
29