Application Vulnerabilities: Table of Contents
Application Vulnerabilities - Overview
View the discovered asset application vulnerabilities across all your companies on one screen.
Application Vulnerabilities - Details
The following data columns in the multiline table view (pictured above) are available: Software Name, Software Version, Affected OS, Total Vulnerabilities, Critical, High, Medium, Low, and Assets.
Column Label | Description / Use Case |
---|---|
Software Name | Displays the affected Software Name. |
Software Version | Displays the Version of the detected Software Name |
Affected OS | Displays the affected Operating System |
Total Vulnerabilites | Displays the total count of all vulnerabilities |
Critical | Displays the total count of Critical vulnerabilities. |
High | Displays the total count of High vulnerabilities. |
Medium | Displays the total count of Medium vulnerabilities. |
Low | Displays the total count of Low vulnerabilities. |
Assets | Displays the count of affected Assets (hyperlink) |
Application Vulnerabilities - Side Navigation Toolbar Actions
PENDING
Application Vulnerabilities - Asset Details Click Through
You can click through from the Affected Assets column to view the assets organized by Company. This will include the affected assets' Host Name, Importance, IP, and Company Name.
From the Assets view (pictured above), you can click on the IP address and go directly to the Asset Details screen.