Vulnerabilities-Inferred Domain |
View | Fields | Measure |
Vulnerabilities Inferred | Acknowledged |
|
| Applicable |
|
| Comment |
|
| Early Warning |
|
| Last Modified Time |
|
| Latest Patch Date |
|
| Likelihood |
|
| Modified Date |
|
| Owner |
|
| Published Date |
|
| Record Type |
|
| Secondary Source |
|
| Severity |
|
| Status |
|
| System Info |
|
| Vulnerability Description |
|
| Vulnerability Identifier |
|
| Vulnerability Title |
|
CVSS v2.0 Scores | CVSS Access Complexity | CVSS Score |
| CVSS Access Vector |
|
| CVSS Authentication |
|
| CVSS Availability Impact |
|
| CVSS Confidentiality Impact |
|
| CVSS Exploitability |
|
| CVSS Integrity Impact |
|
| CVSS Remediation Level |
|
| CVSS Report Confidence |
|
Vulnerabilities Identifications | Identification Description |
|
| Identification Name |
|
| Source |
|
Exploits | CVE Reference |
|
| Description |
|
| Name |
|
| Platform |
|
| Port |
|
| Date Published |
|
| Reliability |
|
| Type |
|
More Information | Data |
|
| Links |
|
| Name |
|
| Type |
|
Vulerabilities References | Reference Name |
|
Vulnerabilities Risks | Reference Number |
|
| Risk Name |
|
Tickets | Disposition | Progress |
| End |
|
| Exception Expiration Date |
|
| Owner |
|
| Owner First Name |
|
| Owner Last Name |
|
| Owner Middle Name |
|
| Planned End |
|
| Planned Start |
|
| Priority |
|
| Status |
|
| Start |
|
| Ticket Description |
|
| Ticket Identifier |
|
| Ticket Stage |
|
| Ticket Type |
|
| Ticket Title |
|
Vulnerabilities CPEs | CPE Description |
|
| CPE URI |
|
| Edition |
|
| Full Name |
|
| Language |
|
| Modified Date |
|
| Product |
|
| Type |
|
| Update |
|
| Vendor |
|
| Version |
|
| Other |
|
| Software Edition |
|
| Target Hardware |
|
| Target Software |
|
Vulnerabilities Patches | Comments |
|
| Full Description |
|
| Last Modified Time |
|
| Patch Name |
|
| Publisher |
|
| Managed By |
|
| Release Date |
|
| Severity |
|
| Short Description |
|
| Type |
|
| URL |
|
| Version |
|
| Vulnerabilities List |
|
Vulnerabilities Change Histories | Changed Attribute |
|
| New Value |
|
| Old Value |
|
| Operation |
|
| When |
|
| Who |
|
| Who First Name |
|
| Who Last Name |
|
| Who Middle Name |
|
Vulnerabilities Custom Attributes 1 | Custom Date 1 | Custom Number 1 |
| Custom Date 2 | Custom Number 2 |
| Custom Date 3 | Custom Number 3 |
| Custom Encrypted String 1 | Custom Rational Number 1 |
| Custom Encrypted String 2 | Custom Rational Number 2 |
| Custom Encrypted String 3 |
|
| Custom Encrypted String 4 |
|
| Custom Encrypted String 5 |
|
| Custom Flag 1 |
|
| Custom Flag 2 |
|
| Custom Flag 3 |
|
| Custom Flag 4 |
|
| Custom Flag 5 |
|
| Custom String 1 |
|
| Custom String 2 |
|
| Custom String 3 |
|
| Custom String 4 |
|
| Custom String 5 |
|
| Custom String 6 |
|
| Custom String 7 |
|
| Custom String 8 |
|
| Custom String 9 |
|
| Custom String 10 |
|
| Custom String 11 |
|
| Custom String 12 |
|
| Custom String 13 |
|
| Custom String 14 |
|
| Custom String 15 |
|
| Custom String 16 |
|
| Custom String 17 |
|
| Custom String 18 |
|
| Custom String 19 |
|
| Custom String 20 |
|
| Custom String 21 |
|
| Custom String 22 |
|
| Custom String 23 |
|
| Custom String 24 |
|
| Custom String 25 |
|
| Custom Text 1 |
|
| Custom Text 2 |
|
Vulnerabilities Custom Attributes 2 | Custom Date 4 | Custom Number 4 |
| Custom Date 5 | Custom Number 5 |
| Custom Date 6 | Custom Number 6 |
| Custom Encrypted String 6 | Custom Rational Number 3 |
| Custom Encrypted String 7 | Custom Rational Number 4 |
| Custom Encrypted String 8 |
|
| Custom Encrypted String 9 |
|
| Custom Encrypted String 10 |
|
| Custom Flag 6 |
|
| Custom Flag 7 |
|
| Custom Flag 8 |
|
| Custom Flag 9 |
|
| Custom Flag 10 |
|
| Custom String 26 |
|
| Custom String 27 |
|
| Custom String 28 |
|
| Custom String 29 |
|
| Custom String 30 |
|
| Custom String 31 |
|
| Custom String 32 |
|
| Custom String 33 |
|
| Custom String 34 |
|
| Custom String 35 |
|
| Custom String 36 |
|
| Custom String 37 |
|
| Custom String 38 |
|
| Custom String 39 |
|
| Custom String 40 |
|
| Custom String 41 |
|
| Custom String 42 |
|
| Custom String 43 |
|
| Custom String 44 |
|
| Custom String 45 |
|
| Custom String 46 |
|
| Custom String 47 |
|
| Custom String 48 |
|
| Custom String 49 |
|
| Custom String 50 |
|
| Custom Text 3 |
|
| Custom Text 4 |
|
Vulnerabilities Custom Attributes 3 | Custom Date 7 | Custom Number 7 |
| Custom Date 8 | Custom Number 8 |
| Custom Date 9 | Custom Number 9 |
| Custom Encrypted String 11 | Custom Rational Number 5 |
| Custom Encrypted String 12 | Custom Rational Number 6 |
| Custom Encrypted String 13 |
|
| Custom Encrypted String 14 |
|
| Custom Encrypted String 15 |
|
| Custom Flag 11 |
|
| Custom Flag 12 |
|
| Custom Flag 13 |
|
| Custom Flag 14 |
|
| Custom Flag 15 |
|
| Custom String 51 |
|
| Custom String 52 |
|
| Custom String 53 |
|
| Custom String 54 |
|
| Custom String 55 |
|
| Custom String 56 |
|
| Custom String 57 |
|
| Custom String 58 |
|
| Custom String 59 |
|
| Custom String 60 |
|
| Custom String 61 |
|
| Custom String 62 |
|
| Custom String 63 |
|
| Custom String 64 |
|
| Custom String 65 |
|
| Custom String 66 |
|
| Custom String 67 |
|
| Custom String 68 |
|
| Custom String 69 |
|
| Custom String 70 |
|
| Custom String 71 |
|
| Custom String 72 |
|
| Custom String 73 |
|
| Custom String 74 |
|
| Custom String 75 |
|
| Custom Text 5 |
|
| Custom Text 6 |
|
Entities | Entity Subtype | Accountability Impact |
| Entity Type | Annual Maintenance |
| Created By | Availability Impact |
| Created Time | Availability Impact Cost Hours |
| Description | Average Remediation Time Days |
| Discovery Method | Business Value |
| First Seen Date | Business Value Hours |
| Installation Date | Confidentiality Impact Cost Per Database |
| Maintenance Date | Confidentiality impact Cost Per Record |
| Maintenance Reference | Confidentiality Impact |
| Manufacturer | Criticality |
| Model | Data Integrity Cost |
| Name | Hardware Replacement Cost |
| Organization Name | Integrity Impact |
| Product Name | Number Of Users |
| Security Classification | Operational Budget |
| Serial Number | Single User Availability Cost |
| Version | Software Replacement Cost |
| Warranty Expiration Date |
|
| Data Source(s) |
|
| Warranty Reference | Status |
CVSS v3.0 Scores | Attack Vector | Overall Score |
| Attack Complexity |
|
| Privilage Required |
|
| User Interaction |
|
| Scope |
|
| Cofidentiality |
|
| Integrity |
|
| Availability |
|
| Modified Attack Vector |
|
| Modified Attack Complexity |
|
| Modifies Privilage Required |
|
| Modified User Interaction |
|
| Modified Scope |
|
| Confidentiality Requirement |
|
| Integrity Requirement |
|
| Availability Requirement |
|
| Modified Confidentiality |
|
| Modified Integrity |
|
| Modified Avaiability |
|
| Exploit Code Maturity |
|
| Remediation Level |
|
| Report Confidence |
|
Spacer |
|
|