Vulnerabilities List Columns

Role Availability Read-Only Investigator Analyst Manager

For each vulnerability in the vulnerabilities columns list, USM Anywhere displays useful information to help you manage that vulnerability.

The following table lists the fields you see on the page.

List of the Default Columns in Vulnerabilities
Column Field Name Description
Last Seen Last date on which the vulnerability was seen in the asset. The displayed date depends on your computer's time zone.
Vulnerability ID Displays the associated Common Vulnerabilities and Exposures (CVE The CVE system provides a method, using CVE IDs, to reference publicly known information security vulnerability and exposures in publicly released software packages and environments.) ID, in case of having it.
Suppressed Indicates whether this vulnerability is marked as suppressed. See Viewing Vulnerabilities Details for more information.
Vulnerability Description

Displays the description of the vulnerability.

Labels Label applied to the vulnerability. See Labeling the Vulnerabilities for more information.
Source Source that found the vulnerability.
Asset Asset that is vulnerable.

Indicates the severity of the vulnerability. Values are High, Medium, Low, and Under Analysis. See About Vulnerability Severity.

Score Displays the score in the Common Vulnerability Scoring System (CVSS Open framework for communicating the characteristics and severity of software vulnerabilities that helps to prioritize actions according to their threat.). See Common Vulnerability Scoring System SIG for more information.
First Seen Detection date of the vulnerability in the asset. The displayed date depends on your computer's time zone.
Available Patches Displays the name of the patch and the number of additional available patches (for example, patch name & [2 more patches]).
IP of the Assets Displays the IP of the assets, if available.
Affected Software Displays the name of the affected software and the number additionally affected (for example, software name & [3 more]).

From the list of vulnerabilities, you can click any individual vulnerability row to display more information on the selected vulnerability. See Viewing Vulnerabilities Details for more information.

To select a vulnerability, select the checkbox to the left of the vulnerability. You can select all vulnerabilities at the same time by selecting the first checkbox in the column. These buttons display when you select a vulnerability:

You can choose the number of items to display by selecting 20, 50, or 100 below the table. You can classify some columns by clicking the icons to the right side of the heading. You can sort the item information in ascending or descending order.

Click the icon to bookmark an item for quick access.

Note: You can view your bookmarked items by going to the secondary menu and clicking the icon. This will display all of your bookmarked items and provide direct links to each of them.

Click Generate Report to open the Configure Report dialog box. See Create a Vulnerabilities Report for more information.

Click the icon displayed next to the asset name below the asset column to access the following options. Your access to these options may vary based on your user role. See Role-Based Access Control (RBAC) in USM Anywhere for more information: