You can identify the discovery methods used for detecting the various vulnerabilities in the KnowledgeBase. Each vulnerability in the KnowledgeBase is assigned one of these discovery methods: Remote Only, Authenticated Only, or Remote or Authenticated.
This method is assigned when you see the vulnerability has the remote discovery icon without the authenticated discovery icon . This means the vulnerability can be detected by remote, unauthenticated scanning.
This method is assigned when you see the vulnerability has the authenticated discovery icon without the remote discovery icon . This means the vulnerability can only be detected using authenticated scanning.
This method is assigned when you see the vulnerability has the authenticated discovery icon and the remote discovery icon . This means the vulnerability can be detected by remote discovery OR authenticated discovery. Only one of these methods is required for vulnerability detection.