Vulnerabilities-Instances Domain |
View | Fields | Measure |
Vulnerabilities | Abstract | Source Flags |
| Analysis | Vulnerability Flags |
| Assessment Check Name |
|
| Assessment Check System |
|
| CVSS Target Distribution |
|
| CVSS Vector |
|
| CVSS Version |
|
| Default Severity |
|
| Deprecated Flag |
|
| Duplicated Flag |
|
| Early Warning Flag |
|
| Identifier |
|
| Last Modified Time |
|
| Likelihood |
|
| Modified Date |
|
| Published Date |
|
| Record Type |
|
| Recovery |
|
| Source |
|
| Vulnerability Identifier |
|
| Vulnerability Description |
|
| Vulnerability Title |
|
CVSS v2.0 Scores | CVSS Access Complexity | CVSS Score |
| CVSS Access Vector |
|
| CVSS Authentication |
|
| CVSS Availability Impact |
|
| CVSS Confidentiality Impact |
|
| CVSS Exploitability |
|
| CVSS Integrity Impact |
|
| CVSS Remediation Level |
|
| CVSS Report Confidence |
|
Exploits | CVE Reference |
|
| Description |
|
| Name |
|
| Platform |
|
| Port |
|
| Date Published |
|
| Reliability |
|
| Type |
|
Vulnerability Identification | Identification Description |
|
| Identification Name |
|
| Source |
|
More Information | Data |
|
| Links |
|
| Name |
|
| Type |
|
Vulnerabilities References | Name |
|
Vulnerabilities Risks | Reference Number |
|
| Risk Name |
|
Tickets | Disposition | Progress |
| End |
|
| Exception Expiration Date |
|
| Owner |
|
| Owner First Name |
|
| Owner Last Name |
|
| Owner Middle Name |
|
| Planned End |
|
| Planned Start |
|
| Priority |
|
| Start |
|
| Status |
|
| Ticket Description |
|
| Ticket Identifier |
|
| Ticket Stage |
|
| Ticket Title |
|
| Ticket Type |
|
CPEs | CPE Name |
|
| CPE URI |
|
| Description |
|
| Edition |
|
| Language |
|
| Modified Date |
|
| Product |
|
| Type |
|
| Update |
|
| Vendor |
|
| Version |
|
| Other |
|
| Software Edition |
|
| Target Hardware |
|
| Target Software |
|
Patches | Comments |
|
| Full Description |
|
| Last Modified Time |
|
| Patch Name |
|
| Patch Type |
|
| Managed By |
|
| Publisher |
|
| Release Date |
|
| Severity |
|
| Short Description |
|
| Source ID |
|
| URL |
|
| Version |
|
| Vulnerability List |
|
Vulnerabilities Change Histories | Changed Attribute |
|
| New Value |
|
| Old Value |
|
| Operation |
|
| When |
|
| Who |
|
| Who First Name |
|
| Who Last Name |
|
| Who Middle Name |
|
Applications | Application Status | Antivirusupdate ID |
| Application Type | Application Data Source |
| System Component Flag |
|
| Update Status |
|
| Update Time |
|
Computersystems To Ports | Association Comment | Source |
Computersystems To Services | Account Name | Source |
| Association Comment |
|
| Operational State |
|
| Operational Status |
|
| Path Name |
|
| Service Type |
|
| Start Mode |
|
Entities | Data Source(s) | Benchmark Flags |
| CN | Business Cost |
| Container Level 1 | CVSS Score |
| Container Level 2 | Entity Number |
| Container Level 3 | Entity Status |
| Container Level 4 | Impact |
| Container Level 5 | Initial Risk Score |
| Container Level 6 | Likelihood |
| Created By | Replacement Cost |
| Created Time | Risk |
| CVSS Collateral DMG Potential | Status |
| DC | Time To Fix |
| Deleted Flag |
|
| Entity Description |
|
| Entity Name |
|
| Entity Subtype |
|
| Entity Tag |
|
| Entity Type |
|
| Discovery Method |
|
| Distinguished Name |
|
| Division |
|
| First Seen Date |
|
| Hidden Flag |
|
| Installation Date |
|
| Internal Flag |
|
| Last Modification Time |
|
| Last Seen Date |
|
| Maintenance Date |
|
| Maintenance Reference |
|
| Manufacturer |
|
| Model |
|
| Organization Name |
|
| Product Name |
|
| Product Version |
|
| Serial Number |
|
| Subdivision |
|
| Tangible Flag |
|
| Update Finding |
|
| Version |
|
| Warranty Expiration Date |
|
| Warranty Reference |
|
Entities Classification | Accountability |
|
| Availability |
|
| Confidentiality |
|
| Business Criticality |
|
| Integrity |
|
| Classification Label |
|
Entities To Vulnerabilities | Association Comment | AV Flags |
| Created By | Calculated Score |
| Created Time | Likelihood |
| Detail | Risk Score |
| Discovery Method | Scores |
| External Catalog ID | Source |
| File Name |
|
| First Seen Time |
|
| Fixed Time |
|
| Issue ID |
|
| Last Modified Time |
|
| Last Scan Time |
|
| Last Seen Time |
|
| Line Number |
|
| Location |
|
| Noise Flag |
|
| Patch Status |
|
| Processed |
|
| Resolved By |
|
| Resolved Comment |
|
| Resolved Status |
|
| Resolved Time |
|
| Risk Flag |
|
| Secondary Source |
|
| Severity |
|
| Test URL |
|
| Total Exposure |
|
Entities Hierarchy | Hierarchy Description |
|
| Level 2 |
|
| Level 3 |
|
| Level 4 |
|
| Level 5 |
|
| Level 6 |
|
| Level 7 |
|
| Level 8 |
|
| Level 9 |
|
| Level 10 |
|
| Level 11 |
|
| Level 12 |
|
| Level 13 |
|
| Level 14 |
|
| Level 15 |
|
| Path |
|
| Root |
|
Entity Ownerships | Owner |
|
| Ownership Type |
|
Network Interfaces | Alias Addresses | Data Source |
| Caption | DHCP Server |
| Description | Enabled Default |
| DHCP Enabled | Enabled State |
| DHCP Lease Expires | Gateway |
| DHCP Lease Obtained | IPv4 Address |
| DNS Servers | Max Data Size |
| Element Name | Network Address |
| Group Addresses | Prefix Length |
| Install Date | Primary WINS Server |
| IP Address | Protocol LF Type |
| LAN ID | Requested State |
| MAC Address | Secondary WINS Server |
| Friendly name | Subnet Mask |
| Name Format |
|
| Network Zone |
|
| Operational Status |
|
| System Name |
|
| Time Of Last State Change |
|
| WINS Server |
|
| Wireless Status |
|
Operating Systems | Description | Current Time Zone |
| Distributed | Enabled Default |
| Element Name | Enabled State |
| Install Date | Max Number Of Processes |
| Last Boot Up Time | Max Process Memory Size |
| Local Date Time | Max Processes Per User |
| Operating System Name | Number Of Licensed Users |
| Operational Status | OS Type |
| OS Caption | Requested State |
| Serial Number | Size Stored In Paging Files |
| Time Of Last State Change | Total Swap Space Size |
| Version | Total Virtual Memory Size |
| Version Name | Total Visible Memory Size |
Ports | Port Description |
|
| Port Name |
|
| Port Number |
|
| Protocol |
|
Services | Service Description |
|
| Name |
|
Source info | Caption | License ID |
| Connector Name |
|
| Connector Type |
|
| Icon |
|
Vulnerabilities To Endpoints | Association Comment | Source |
Vulnerabilities Custom Attributes 1 | Custom Date 1 | Custom Number 2 |
| Custom Date 2 | Custom Number 3 |
| Custom Date 3 | Custom Rational Number 1 |
| Custom Encrypted String 1 | Custom Rational Number 2 |
| Custom Encrypted String 2 |
|
| Custom Encrypted String 3 |
|
| Custom Encrypted String 4 |
|
| Custom Encrypted String 5 |
|
| Custom Flag 1 |
|
| Custom Flag 2 |
|
| Custom Flag 3 |
|
| Custom Flag 4 |
|
| Custom Flag 5 |
|
| Custom String 1 |
|
| Custom String 2 |
|
| Custom String 3 |
|
| Custom String 4 |
|
| Custom String 5 |
|
| Custom String 6 |
|
| Custom String 7 |
|
| Custom String 8 |
|
| Custom String 9 |
|
| Custom String 10 |
|
| Custom String 11 |
|
| Custom String 12 |
|
| Custom String 13 |
|
| Custom String 14 |
|
| Custom String 15 |
|
| Custom String 16 |
|
| Custom String 17 |
|
| Custom String 18 |
|
| Custom String 19 |
|
| Custom String 20 |
|
| Custom String 21 |
|
| Custom String 22 |
|
| Custom String 23 |
|
| Custom String 24 |
|
| Custom String 25 |
|
| Custom Text 1 |
|
| Custom Text 2 |
|
Vulnerabilities Custom Attributes 2 | Custom Date 4 | Custom Number 4 |
| Custom Date 5 | Custom Number 5 |
| Custom Date 6 | Custom Number 6 |
| Custom Encrypted String 6 | Custom Rational Number 3 |
| Custom Encrypted String 7 | Custom Rational Number 4 |
| Custom Encrypted String 8 |
|
| Custom Encrypted String 9 |
|
| Custom Encrypted String 10 |
|
| Custom Flag 6 |
|
| Custom Flag 7 |
|
| Custom Flag 8 |
|
| Custom Flag 9 |
|
| Custom Flag 10 |
|
| Custom String 26 |
|
| Custom String 27 |
|
| Custom String 28 |
|
| Custom String 29 |
|
| Custom String 30 |
|
| Custom String 31 |
|
| Custom String 32 |
|
| Custom String 33 |
|
| Custom String 34 |
|
| Custom String 35 |
|
| Custom String 36 |
|
| Custom String 37 |
|
| Custom String 38 |
|
| Custom String 39 |
|
| Custom String 40 |
|
| Custom String 41 |
|
| Custom String 42 |
|
| Custom String 43 |
|
| Custom String 44 |
|
| Custom String 45 |
|
| Custom String 46 |
|
| Custom String 47 |
|
| Custom String 48 |
|
| Custom String 49 |
|
| Custom String 50 |
|
| Custom Text 3 |
|
| Custom Text 4 |
|
Vulnerabilities Custom Attributes 3 | Custom Date 7 | Custom Number 7 |
| Custom Date 8 | Custom Number 8 |
| Custom Date 9 | Custom Number 9 |
| Custom Encrypted String 11 | Custom Rational Number 5 |
| Custom Encrypted String 12 | Custom Rational Number 6 |
| Custom Encrypted String 13 |
|
| Custom Encrypted String 14 |
|
| Custom Encrypted String 15 |
|
| Custom Flag 11 |
|
| Custom Flag 12 |
|
| Custom Flag 13 |
|
| Custom Flag 14 |
|
| Custom Flag 15 |
|
| Custom String 51 |
|
| Custom String 52 |
|
| Custom String 53 |
|
| Custom String 54 |
|
| Custom String 55 |
|
| Custom String 56 |
|
| Custom String 57 |
|
| Custom String 58 |
|
| Custom String 59 |
|
| Custom String 60 |
|
| Custom String 61 |
|
| Custom String 62 |
|
| Custom String 63 |
|
| Custom String 64 |
|
| Custom String 65 |
|
| Custom String 66 |
|
| Custom String 67 |
|
| Custom String 68 |
|
| Custom String 69 |
|
| Custom String 70 |
|
| Custom String 71 |
|
| Custom String 72 |
|
| Custom String 73 |
|
| Custom String 74 |
|
| Custom String 75 |
|
| Custom Text 5 |
|
| Custom Text 6 |
|
CVSS v3.0 Scores | Attack Vector | Overall Score |
| Attack Complexity |
|
| Privilege Required |
|
| User Interaction |
|
| Scope |
|
| Confidentiality |
|
| Integrity |
|
| Availability |
|
| Modified Attack Vector |
|
| Modified Attack Complexity |
|
| Modifies Privilege Required |
|
| Modified User Interaction |
|
| Modified Cofidentiality |
|
| Modified Integrity |
|
| Modified Availability |
|
| Exploit Code Maturity |
|
| Remediation Level |
|
| Report Confidence |
|
Vulnerability Enhanced Score | Access Complexity | Days Open |
| Access Vector | Denominator |
| Authentication | Exploit Factor |
| Availability | Numerator |
| Confidentiality | Enhanced Score |
| Identifier |
|
| Integrity |
|
Vulnerability Risk Score | Entity Criticality | Number of Vulnerability Instances |
|
| Entity Criticality Factor |
|
| Vulnerability Risk Factor |
|
| Vulnerability Risk Score |