USM Anywhere™

Vulnerabilities List Columns

Role Availability Read-Only Analyst Manager

For each vulnerability in the vulnerabilities columns list, USM Anywhere displays useful information to help you manage that vulnerability.

The following table lists the fields you see on the page.

List of the Default Columns in Vulnerabilities
Column Field Name Description
Last Seen Last date on which the vulnerability was seen in the asset. The displayed date depends on your computer's time zone.
Vulnerability ID Displays the associated Common Vulnerabilities and Exposures (CVE The CVE system provides a method, using CVE IDs, to reference publicly known information security vulnerability and exposures in publicly released software packages and environments.) ID, in case of having it.
Vulnerability Description

Displays the description of the vulnerability.

Labels Label applied to the vulnerability. See Labeling the Vulnerabilities for more information.
Source Source that found the vulnerability.
Asset This is the asset that is vulnerable.
Severity

Indicates the severity of the vulnerability. Values are High, Medium, Low, and Under Analysis. See About Vulnerability Severity.

Score Displays the score in the Common Vulnerability Scoring System (CVSS Open framework for communicating the characteristics and severity of software vulnerabilities that helps to prioritize actions according to their threat.). See Common Vulnerability Scoring System SIG for more information.
First Seen Detection date of the vulnerability in the asset. The displayed date depends on your computer's time zone.

From the list of vulnerabilities, you can click any individual vulnerability row to display more information on the selected vulnerability. See Viewing Vulnerabilities Details for more information.

To select a vulnerability, select the check-box to the left of the vulnerability. You can select all vulnerabilities at the same time by selecting the first checkbox in the column. These buttons display when you select a vulnerability:

You can choose the number of items to display by selecting 20, 50, or 100 below the table. You can classify some columns by clicking the icons to the right side of the heading. You can sort the item information in ascending or descending order.

Click the icon to bookmark an item for quick access. Clicking the icon on the secondary menu shows the bookmarked items and provides links to them.

Click Generate Report to open the Configure Report dialog box. See Create a Vulnerabilities Report for more information.

Click the icon displayed next to the asset name below the asset column to access these options: