The Vulnerability Detection report (.csv) offers an extensive summary of your organization’s external attack surface, including a detailed list of assets such as IP addresses and domains, along with the corresponding vulnerabilities (CVEs) that have been detected.
Generate this report from the “Findings and Infrastructure Details” section of the Reports page. Select your My Company or My Subsidiary.
This report is available to customers with the EASM Enhanced module for SPM. You can review the features included with the EASM Foundations and EASM Enhanced modules here.
Report Data
Field | Description | |
---|---|---|
Certainty | The level of certainty that a vulnerability has been confirmed to exist and poses a risk. | |
Description | A description of the vulnerability. | |
Evidence Count | The amount of evidence. | |
Dates | Observation dates. | |
First Seen | The date when the vulnerability was first detected. | |
Last Seen | The date when the vulnerability was last detected. | |
Name | The name of this vulnerability. | |
Remediation Tip | Instructions for how to resolve the issue. | |
Severity | The vulnerability’s weight and criticality based on the CVSS. See Bitsight severity. | |
Severity Details | The Bitsight severity. | |
Severity Level | The CVSS score. |
- May 12, 2023: Published.
Feedback
0 comments
Please sign in to leave a comment.