Vulnerabilities-Instances Domain

Vulnerabilities-Instances Domain
ViewFieldsMeasure
VulnerabilitiesAbstractSource Flags

AnalysisVulnerability Flags

Assessment Check Name

Assessment Check System

CVSS Target Distribution

CVSS Vector

CVSS Version

Default Severity

Deprecated Flag

Duplicated Flag

Early Warning Flag

Identifier

Last Modified Time

Likelihood

Modified Date

Published Date

Record Type

Recovery

Source

Vulnerability Identifier

Vulnerability Description

Vulnerability Title
CVSS v2.0 ScoresCVSS Access ComplexityCVSS Score

CVSS Access Vector

CVSS Authentication

CVSS Availability Impact

CVSS Confidentiality Impact

CVSS Exploitability

CVSS Integrity Impact

CVSS Remediation Level

CVSS Report Confidence
ExploitsCVE Reference

Description

Name

Platform

Port

Date Published

Reliability

Type
Vulnerability IdentificationIdentification Description

Identification Name

Source
More InformationData

Links

Name

Type
Vulnerabilities ReferencesName
Vulnerabilities RisksReference Number

Risk Name
TicketsDispositionProgress

End

Exception Expiration Date

Owner

Owner First Name

Owner Last Name

Owner Middle Name

Planned End

Planned Start

Priority

Start

Status

Ticket Description

Ticket Identifier

Ticket Stage

Ticket Title

Ticket Type
CPEsCPE Name

CPE URI

Description

Edition

Language

Modified Date

Product

Type

Update

Vendor

Version

Other

Software Edition

Target Hardware

Target Software
PatchesComments

Full Description

Last Modified Time

Patch Name

Patch Type

Managed By

Publisher

Release Date

Severity

Short Description

Source ID

URL

Version

Vulnerability List
Vulnerabilities Change HistoriesChanged Attribute

New Value

Old Value

Operation

When

Who

Who First Name

Who Last Name

Who Middle Name
ApplicationsApplication StatusAntivirusupdate ID

Application TypeApplication Data Source

System Component Flag

Update Status

Update Time
Computersystems To PortsAssociation CommentSource
Computersystems To ServicesAccount NameSource

Association Comment

Operational State

Operational Status

Path Name

Service Type

Start Mode
EntitiesData Source(s)Benchmark Flags

CNBusiness Cost

Container Level 1CVSS Score

Container Level 2Entity Number

Container Level 3Entity Status

Container Level 4Impact

Container Level 5Initial Risk Score

Container Level 6Likelihood

Created ByReplacement Cost

Created TimeRisk

CVSS Collateral DMG PotentialStatus

DCTime To Fix

Deleted Flag

Entity Description

Entity Name

Entity Subtype

Entity Tag

Entity Type

Discovery Method

Distinguished Name

Division

First Seen Date

Hidden Flag

Installation Date

Internal Flag

Last Modification Time

Last Seen Date

Maintenance Date

Maintenance Reference

Manufacturer

Model

Organization Name

Product Name

Product Version

Serial Number

Subdivision

Tangible Flag

Update Finding

Version

Warranty Expiration Date

Warranty Reference
Entities ClassificationAccountability

Availability

Confidentiality

Business Criticality

Integrity

Classification Label
Entities To VulnerabilitiesAssociation CommentAV Flags

Created ByCalculated Score

Created TimeLikelihood

DetailRisk Score

Discovery MethodScores

External Catalog IDSource

File Name

First Seen Time

Fixed Time

Issue ID

Last Modified Time

Last Scan Time

Last Seen Time

Line Number

Location

Noise Flag

Patch Status

Processed

Resolved By

Resolved Comment

Resolved Status

Resolved Time

Risk Flag

Secondary Source

Severity

Test URL

Total Exposure
Entities HierarchyHierarchy Description

Level 2

Level 3

Level 4

Level 5

Level 6

Level 7

Level 8

Level 9

Level 10

Level 11

Level 12

Level 13

Level 14

Level 15

Path

Root
Entity OwnershipsOwner

Ownership Type
Network InterfacesAlias AddressesData Source

CaptionDHCP Server

DescriptionEnabled Default

DHCP EnabledEnabled State

DHCP Lease ExpiresGateway

DHCP Lease ObtainedIPv4 Address

DNS ServersMax Data Size

Element NameNetwork Address

Group AddressesPrefix Length

Install DatePrimary WINS Server

IP AddressProtocol LF Type

LAN IDRequested State

MAC AddressSecondary WINS Server

Friendly nameSubnet Mask

Name Format

Network Zone

Operational Status

System Name

Time Of Last State Change

WINS Server

Wireless Status
Operating SystemsDescriptionCurrent Time Zone

DistributedEnabled Default

Element NameEnabled State

Install DateMax Number Of Processes

Last Boot Up TimeMax Process Memory Size

Local Date TimeMax Processes Per User

Operating System NameNumber Of Licensed Users

Operational StatusOS Type

OS CaptionRequested State

Serial NumberSize Stored In Paging Files

Time Of Last State ChangeTotal Swap Space Size

VersionTotal Virtual Memory Size

Version NameTotal Visible Memory Size
PortsPort Description

Port Name

Port Number

Protocol
ServicesService Description

Name
Source infoCaptionLicense ID

Connector Name

Connector Type

Icon
Vulnerabilities To EndpointsAssociation CommentSource
Vulnerabilities Custom Attributes 1Custom Date 1Custom Number 2

Custom Date 2Custom Number 3

Custom Date 3Custom Rational Number 1

Custom Encrypted String 1Custom Rational Number 2

Custom Encrypted String 2

Custom Encrypted String 3

Custom Encrypted String 4

Custom Encrypted String 5

Custom Flag 1

Custom Flag 2

Custom Flag 3

Custom Flag 4

Custom Flag 5

Custom String 1

Custom String 2

Custom String 3

Custom String 4

Custom String 5

Custom String 6

Custom String 7

Custom String 8

Custom String 9

Custom String 10

Custom String 11

Custom String 12

Custom String 13

Custom String 14

Custom String 15

Custom String 16

Custom String 17

Custom String 18

Custom String 19

Custom String 20

Custom String 21

Custom String 22

Custom String 23

Custom String 24

Custom String 25

Custom Text 1

Custom Text 2
Vulnerabilities Custom Attributes 2Custom Date 4Custom Number 4

Custom Date 5Custom Number 5

Custom Date 6Custom Number 6

Custom Encrypted String 6Custom Rational Number 3

Custom Encrypted String 7Custom Rational Number 4

Custom Encrypted String 8

Custom Encrypted String 9

Custom Encrypted String 10

Custom Flag 6

Custom Flag 7

Custom Flag 8

Custom Flag 9

Custom Flag 10

Custom String 26

Custom String 27

Custom String 28

Custom String 29

Custom String 30

Custom String 31

Custom String 32

Custom String 33

Custom String 34

Custom String 35

Custom String 36

Custom String 37

Custom String 38

Custom String 39

Custom String 40

Custom String 41

Custom String 42

Custom String 43

Custom String 44

Custom String 45

Custom String 46

Custom String 47

Custom String 48

Custom String 49

Custom String 50

Custom Text 3

Custom Text 4
Vulnerabilities Custom Attributes 3Custom Date 7Custom Number 7

Custom Date 8Custom Number 8

Custom Date 9Custom Number 9

Custom Encrypted String 11Custom Rational Number 5

Custom Encrypted String 12Custom Rational Number 6

Custom Encrypted String 13

Custom Encrypted String 14

Custom Encrypted String 15

Custom Flag 11

Custom Flag 12

Custom Flag 13

Custom Flag 14

Custom Flag 15

Custom String 51

Custom String 52

Custom String 53

Custom String 54

Custom String 55

Custom String 56

Custom String 57

Custom String 58

Custom String 59

Custom String 60

Custom String 61

Custom String 62

Custom String 63

Custom String 64

Custom String 65

Custom String 66

Custom String 67

Custom String 68

Custom String 69

Custom String 70

Custom String 71

Custom String 72

Custom String 73

Custom String 74

Custom String 75

Custom Text 5

Custom Text 6
CVSS v3.0 ScoresAttack VectorOverall Score

Attack Complexity

Privilege Required

User Interaction

Scope

Confidentiality

Integrity

Availability

Modified Attack Vector

Modified Attack Complexity

Modifies Privilege Required

Modified User Interaction

Modified Cofidentiality

Modified Integrity

Modified Availability

Exploit Code Maturity

Remediation Level

Report Confidence
Vulnerability Enhanced ScoreAccess ComplexityDays Open

Access VectorDenominator

AuthenticationExploit Factor

AvailabilityNumerator

ConfidentialityEnhanced Score

Identifier

Integrity
Vulnerability Risk ScoreEntity CriticalityNumber of Vulnerability Instances


Entity Criticality Factor


Vulnerability Risk Factor


Vulnerability Risk Score