Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Next »

Application Vulnerabilities: Table of Contents


Application Vulnerabilities - Overview

View the discovered asset application vulnerabilities across all your companies on one screen.


Application Vulnerabilities - Details

The following data columns in the multiline table view (pictured above) are available: Software Name, Software Version, Affected OS, Total Vulnerabilities, Critical, High, Medium, Low, and Assets.

Column Label

Description / Use Case

Software Name

Displays the affected Software Name.

Software Version

Displays the Version of the detected Software Name

Affected OS

Displays the affected Operating System

Total Vulnerabilites

Displays the total count of all vulnerabilities

Critical

Displays the total count of Critical vulnerabilities.

High

Displays the total count of High vulnerabilities.

Medium

Displays the total count of Medium vulnerabilities.

Low

Displays the total count of Low vulnerabilities.

Assets

Displays the count of affected Assets (hyperlink)


Application Vulnerabilities - Asset Details Click Through

You can click through from the Affected Assets column to view the assets organized by Company. This will include the affected assets' Host Name, Importance, IP, and Company Name.

From the Assets view (pictured above), you can click on the IP address and go directly to the Asset Details screen.

  • No labels