If you have a source of vulnerabilities, such as the iDefense connector, the Vulnerabilities grid will include virtual scans. Virtual scans produce inferred vulnerabilities. While the iDefense connector is a major source of CVE to CPE mapping, the NVD is the primary source. Vulnerabilities can also be created manually.