The vulnerabilities details page provides in-depth information on vulnerabilities .
To view the details of a vulnerability
- Navigate to ENVIRONMENT > VULNERABILITIES.
- Click the vulnerabilityA known issue or weakness in a system, procedure, internal control, software package, or hardware that could be used to compromise security. to display its details.
Click the star symbol to the left of an item to mark it as a bookmark for quick access. Clicking the Star icon () on the secondary menu shows the bookmarked items and a link to them.
The Vulnerabilities Details page includes vulnerability management functions that are supported for your assigned user roleTasks and responsibilities based on job description and position within an organization. A user's role is often used to define access to functionality and privileges to perform specific tasks and operations.
- Select Action. Use this button to launch an authenticated assetAn IP-addressable host, including but not limited to network devices, virtual servers, and physical servers. scan. See Applying Actions to Vulnerabilities for more information.
- Apply Label. Use this button to classify your vulnerabilities. See Labeling the Vulnerabilities for further information.
You can see the vulnerabilities details, then a description, the affected software, and the associated asset. If you want more information,