Role Availability | Read-Only | Investigator | Analyst | Manager |
The vulnerabilities details page provides in-depth information on vulnerabilities.
To view the details of a vulnerability
- Go to Environment > Vulnerabilities.
-
Click the vulnerability A known issue or weakness in a system, procedure, internal control, software package, or hardware that could be used to compromise security. to display a summary view, and then click the vulnerability name to open the full details of the vulnerability.
- In the upper right corner, click Previous and Next to navigate between items.
- Click the icon to close the dialog box.
- Click the vulnerability title to expand its details.
Click the icon to bookmark an item for quick access.
The Vulnerabilities Details page includes the Select Action button that is supported for your assigned user role Tasks and responsibilities based on job description and position within an organization. A user's role is often used to define access to functionality and privileges to perform specific tasks and operations.. Use this button to launch an authenticated asset An IP-addressable host, including but not limited to network devices, virtual servers, and physical servers. scan. See Applying Actions to Vulnerabilities for more information.
You can see the vulnerabilities details, then a description, the affected software, and the associated asset. If you want more information,
The Labels field indicates if the vulnerability has been classified by using a label. You can click the icon to manage the labels of the vulnerability. See Labeling the Vulnerabilities for more information.
The Suppressed field enables you to indicate whether this vulnerability has been suppressed. You can click the icon to select a suppression option (Yes or No). A vulnerability marked Yes will continue to be marked as suppressed on all future scans or until this field is updated.