Vulnerability

The Vulnerability tab offers a clear view of known security weaknesses and risks for a Configuration Item (CI). It helps identify and prioritize remediation efforts by listing vulnerabilities found during scans or integrations.

How to use:

  1. Navigate to CMDB and select a CI.

  2. Click the Vulnerability tab.

  3. Review CVEs and filter by severity, ID, or publish/modify date.

  4. If no records appear, the CI may have no known vulnerabilities or scanning may be pending.

Purpose & benefit: