Thank you for your feedback.
Form temporarily unavailable. Please try again or contact to submit your comments.
  • London
  • Kingston
  • Jakarta
  • Istanbul
  • Helsinki
  • Geneva
  • Store

Vulnerabilities in the software of configuration items

Vulnerabilities in the software of configuration items

With Vulnerability Response, compare vulnerability-related data pulled from internal and external sources to vulnerable resources and software identified in the Software Asset module. If a vulnerability is found in an asset, escalate it by creating change requests, problem records, and security incident records (if Security Incident Response is activated).

Manage vulnerable items individually, grouped by the vulnerability or grouped by CI. Each vulnerability is represented by a vulnerability entry in the library, from the NVD, or a third-party source.

Use Common Weakness Enumeration (CWE) records downloaded from the CWE database for reference when deciding whether a vulnerability must be escalated. Each CWE record also includes an associated knowledge article that describes the weakness. You cannot escalate a vulnerability from the Common Weakness Enumerations page. This page is for reference only.

This site is scheduled for a small content update on Monday, November 12th, between the hours of 4:00pm and 9:00pm Pacific Time (Nov 13 00:00 – 05:00 UTC). Acces to this site may be delayed during that time.