Detailed information about a vulnerability includes information from the vulnerabilities table, and the following fields:
Mitigations – recommendations on remediating the vulnerability (for example, which software version should be installed on the device).
Links – links to publicly available resources containing additional information about the vulnerability.
CVE history – dates of identification, confirmation, and publication of the vulnerability in publicly available sources.
Events – list of events associated with the vulnerability (if there are more than 10 events, the number of undisplayed events is shown under the list).
Other devices with this vulnerability – list of devices in which this vulnerability was detected (if there are more than 10 devices, the number of undisplayed devices is shown under the list).
To view information about a vulnerability in the Vulnerabilities section:
Select the relevant vulnerability in the vulnerabilities table.
In the right part of the web interface window, you will see the details area containing detailed information about the vulnerability.
To view information about a vulnerability on the Devices tab in the Assets section:
Click the CVE ID of the vulnerability in the Vulnerabilities column or in the details area of the device with the vulnerability.
You will see a window containing detailed information about the vulnerability.