Vulnerabilities
The Vulnerabilities section is the first one you see when clicking on one of your group's names.
Note that if you keep the mouse cursor on the tab vulnerabilities, you can see the total of all open vulnerabilities in that group.
Vulnerabilities Table
In the Vulnerabilities section, you will find a table containing all the types of vulnerabilities reported in the selected group. This table includes different columns, which you can activate or deactivate according to the information you want to see using the columns filter button.
In total, we have twelve columns which are described below:
- Type: The name of the type of vulnerability from our standardized set whose characteristics are met by the vulnerability found in your system.
- Status: The condition of the type of vulnerability, which is Vulnerable if at least one vulnerability has not yet been remediated; otherwise, it is Safe.
- Severity: The maximum CVSS v3.1 (Common Vulnerability Scoring System) temporal score among the open vulnerabilities in this type of vulnerability.
- % Risk Exposure: Represents the contribution that this type of vulnerability is making to the metric CVSSF for this group. It is given as a percentage and only open vulnerabilities are taking into account.
- Open vulnerabilities: The total number of locations where the type of vulnerability was found and is still vulnerable; that is, not yet remediated.
- Last report: The number of days elapsed since we found a vulnerability of that specific type, regardless of its vulnerable or safe status.
- Age: The number of days elapsed since the type of vulnerability was found in your system for the first time.
- Remediation %: The percentage of closed vulnerabilities of that type.
- Reattack: The status of the reattacks for the type of vulnerability, which is Pending if at least one requested reattack is due to one of the vulnerabilities of this type; otherwise, it is just a hyphen.
- Release Date: Date when the typology was reported.
- Treatment: List the treatments that this typology has.
- Description: A definition of the type of vulnerability.
Note that you can identify when a vulnerability type is new because you will see the tag called new. Remember that this tag will be enabled for eight days. After these days, it will disappear.
There is also a downward-facing arrow on the left of the Type column, which, upon click, you will find the information that the column filter offers you.
Vulnerabilities type
In the vulnerability view, you can visualize the different typologies of reported vulnerabilities. These typologies can be repeated several times, grouping within these vulnerabilities (locations) with the same characteristics such as description, recommendation, severity and other characteristics. For more information on the location section, click here.
Functionalities
In the Vulnerabilities section, you can see the following functionalities:
Columns filter
One way of filtering the table is by hiding or showing columns. To do this, you need to click the Columns button.
This will cause a pop-up window to appear, from which you can enable and disable columns.
Filters
The other way of filtering is by clicking the Filters button. Here you will have the activated filters that you have at the same time activated in the column filter.
Remember that you can see the filters you have applied in the table.
Note: These applied filters will be kept in the vulnerability view in the different groups of the same or another organization.
Search bar
The search bar filters the information contained in the columns of the table.
You can also find in the vulnerability view how to generate reports. Click here if you want to know more.