Our Vulnerabilities tab gives you an integrated, incremental search and browse experience to help you find all about your assets.
Choose Vulnerability to display vulnerability data (like we did here), or Asset for asset data. You can easily browse the data list and explore details. For example click the QID 105170 to view details for that vulnerability. |
![]() |
The Group By option help you organize your data. For example you can select Group By Severity then click Vulnerability Count for severity 5. |
![]() |
The Filters option lets you choose the type of vulnerabilities to filter the vulnerabilities further. |
![]() |
You'll get a listing of severity 5 vulnerabilities. Notice the query selector shows your query. |
![]() |
You'll notice now you have fewer total vulnerabilities (in this case 112) Use the metadata filters on the right to narrow your search further. For example select Windows 7 Service Pack 1 |
![]() |
This narrows your results to severity 5 on Windows 7 Service Pack 1. You'll notice query in the query selector is updated. |
![]() |
Total vulnerabilities is reduced even more (to 18 in this case). You can continue this exploration to browse to the details your interested in. |
![]() |
Using the query box you can add more query logic. For example say you want to see only New vulnerabilities. Just type "and" then start typing "status". Pick the token name vulnerabilities.status. Choose the token value NEW and view syntax help on the right to help you form your query. Hit return to run the query when you're ready. |
![]() |
Easily add
another query by clicking |
![]() |
Using our advanced search capabilities you can easily create robust queries using the many available search tokens. Looking for help with how to search? Click here |
Using our |
You could also export the search
results to your local system and share them with other users.
You can export results in CSV format. It just takes a minute to
export search results. Click the download
|
Next, click Download. That's it! The vulnerability details are downloaded in CSV format. The download is limited to 10,000 vulnerability records. |