Skip to main content

Vulnerabilities

The Vulnerabilities section is the first one you see when clicking on one of your group's names.

Note that if you keep the mouse cursor on the tab vulnerabilities, you can see the total of all open vulnerabilities in that group.

Total of vulnerabilities

Vulnerabilities Table

In the Vulnerabilities section, you will find a table containing all the types of vulnerabilities reported in the selected group. This table includes different columns, which you can activate or deactivate according to the information you want to see using the columns filter button.

Vulnerability Table First Half

In total, we have twelve columns which are described below:

  • Type: The name of the type of vulnerability from our standardized set whose characteristics are met by the vulnerability found in your system.
  • Status: The condition of the type of vulnerability, which is Vulnerable if at least one vulnerability has not yet been remediated; otherwise, it is Safe.
  • Severity: The maximum CVSS v3.1 (Common Vulnerability Scoring System) temporal score among the open vulnerabilities in this type of vulnerability.
  • % Risk Exposure: Represents the contribution that this type of vulnerability is making to the metric CVSSF for this group. It is given as a percentage and only open vulnerabilities are taking into account.
  • Open vulnerabilities: The total number of locations where the type of vulnerability was found and is still vulnerable; that is, not yet remediated.
  • Last report: The number of days elapsed since we found a vulnerability of that specific type, regardless of its vulnerable or safe status.
  • Age: The number of days elapsed since the type of vulnerability was found in your system for the first time.
  • Remediation %: The percentage of closed vulnerabilities of that type.
  • Reattack: The status of the reattacks for the type of vulnerability, which is Pending if at least one requested reattack is due to one of the vulnerabilities of this type; otherwise, it is just a hyphen.
  • Release Date: Date when the typology was reported.
  • Treatment: List the treatments that this typology has.
  • Description: A definition of the type of vulnerability.

Note that you can identify when a vulnerability type is new because you will see the tag called new. Remember that this tag will be enabled for eight days. After these days, it will disappear.

new tag

There is also a downward-facing arrow on the left of the Type column, which, upon click, you will find the information that the column filter offers you.

Vulnerability Table Second Half

Vulnerabilities type

In the vulnerability view, you can visualize the different typologies of reported vulnerabilities. These typologies can be repeated several times, grouping within these vulnerabilities (locations) with the same characteristics such as description, recommendation, severity and other characteristics. For more information on the location section, click here.

Vuln type

Functionalities

In the Vulnerabilities section, you can see the following functionalities:

Columns filter

One way of filtering the table is by hiding or showing columns. To do this, you need to click the Columns button.

Columns button

This will cause a pop-up window to appear, from which you can enable and disable columns.

Filtering Columns

Filters

The other way of filtering is by clicking the Filters button. Here you will have the activated filters that you have at the same time activated in the column filter.

Filters Button

Remember that you can see the filters you have applied in the table.

Filters applied

Note: These applied filters will be kept in the vulnerability view in the different groups of the same or another organization.

The search bar filters the information contained in the columns of the table.

note

You can also find in the vulnerability view how to generate reports. Click here if you want to know more.