Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
📙 You will learn
The information available in Application and Infrastructure Vulnerability Details.
Prerequisites
Audience: IT Professional or End User
Difficulty: Basic
Time needed: Approximately 10 minutes
Tools required: N/A
Application Vulnerability Details
Within an application that contains scans, a vulnerability list separated by severity can be viewed. Expanding a selected vulnerability reveals details including its current status, comments, attached files, and the ability to view more in-depth details.
Clicking on the speech bubble icon, highlighted in the circle below, reveals a Comments section beneath the vulnerability displaying any comments that have been added to it. New comments can also be added via the Add Comments button.
Similarly, clicking on the page icon, highlighted in the circle below, reveals a Files section beneath the vulnerability displaying any files that have been attached to it.
Clicking on the View More link redirects to a Vulnerability Details page for the vulnerability. This page details open findings, metadata, comments, files, finding files, and a history of events for the vulnerability. Comments, tags, and files can be edited/deleted from this page as well.
The Vulnerability Details page also provides an action drop-down button menu with several options for users to affect the vulnerability, including the following:
Close Vulnerability
Mark as False Positive
Mark as Contested
Mark as Verified
Change Severity
Manage Tags
Infrastructure Vulnerability Details
Within a network’s that contains scanner data, a range of IP address clusters and their vulnerabilities, separated by severity, can be viewed.
Expanding a selected IP range, by clicking on a desired range as mentioned above, reveals the range’s details including individual addresses, last scanned date, and vulnerability totals.
Selecting a particular address will reveal its individual details including CVEs, CVSS Scores, and dates. These results can also be filtered by severity level by selecting the desired severity level button on the UI’s results row.
Clicking on a desired result will redirect to its Vulnerability Details page, containing a list of associated CVEs and further details including the Scanner Name, Finding Name, Scanner Severity, Severity, a CVSS score (if assigned), IP, and dates.
Table of Contents
Table of Contents |
---|
Image Removed
Image Removed