This report displays software vulnerabilities detected on managed devices. This report includes the following columns:
Severity level. Vulnerability severity level.
Vendor. Vendor of the application in which the vulnerability is detected.
Application. Application in which the vulnerability is detected.
Application version. Version of the application in which the vulnerability is detected.
Device. Device on which the vulnerability is detected.
Vulnerability name. Name of the detected vulnerability. This name is received from the security application.
Object. The object in which the vulnerability is detected. For example, if the vulnerability is detected in a file, this column contains the path to the file.
Detection time. Time of the vulnerability detection.
Updates are available. Whether patches that fix the vulnerability are available.