Thank you for your feedback.
Form temporarily unavailable. Please try again or contact to submit your comments.

Identify and escalate security issues in vulnerable software

Log in to subscribe to topics and get notified when content changes.

Identify and escalate security issues in vulnerable software

With Vulnerability Response, view software vulnerabilities returned from NIST National Vulnerability Database (NVD) entries. Then use this information to match the vulnerable software entries to a Software Asset Management discovery model.

Before you begin

Role required: sn_vul.vulnerability_write


  1. Navigate to Vulnerability > Libraries > Vulnerable Software.
    A list of vulnerable software downloaded is shown.
  2. Click an NVD software record to view vulnerability information.
  3. Click the following related lists to get more information for identifying vulnerabilities.
    Related listDescription
    Vulnerable Items Lists any vulnerable items, which consist of pairings of potentially vulnerable CIs and software. To get more information about a pairing, click the information icon (information icon).
    Note: If software is removed, any associated vulnerable items are closed and removed from the Vulnerable Items related list.
    Vulnerability Entries Lists vulnerability entries for the selected software record. Click a record to view its details.
    If vulnerabilities were identified and vulnerable items were created, you can Remediate vulnerable groups, as needed.