CVE viewer
Use the CVE viewer dashboard in Risk Monitor to look up details about a specific vulnerability in your IT estate.
Description
Select a CVE ID from the CVE ID list to see details about that specific vulnerability, such as the date of publication, the base severity and base score, and a short description of the vulnerability.
The Remediation recommendation table gives recommendations on how to remediate the vulnerability. The Fix application name and Fix application version columns show you the minimum version to which you must upgrade to remediate the vulnerability. The Recommended application name and Recommended application version columns show the version to which you should upgrade to remove as many vulnerabilities as possible.
Characteristics
You can refer to the tables below for descriptions of the key figures, charts, and tables on the dashboard.
Key figures
The figures give some general details about the selected vulnerability.
Key figure | Description |
---|---|
Published date | The date the CVE ID was published by MITRE. |
Severity | The base severity for the vulnerability. |
Base score | The base score for the vulnerability. |
Charts
The chart gives a quick overview of how the selected vulnerability affects the devices in your IT estate.
Chart | Description |
---|---|
Inventoried devices by application name and software version | Shows the number of devices that are affected by the vulnerability per application and version. Select a bar in the chart to filter the Remediation recommendation table by the application version represented by the bar. |
Tables
Use the table to see the remediation recommendations for the selected vulnerability.
Select a column header to sort the table by that column.
Table | Description |
---|---|
Remediation recommendation | The table shows the following details about the selected vulnerability:
|