Product documentation Docs
    • English
    • Deutsch
    • 日本語
    • 한국어
    • Français
  • More Sites
    • Now Community
    • Developer Site
    • Knowledge Base
    • Product Information
    • ServiceNow.com
    • Training
    • Customer Success Center
    • ServiceNow Support Videos
  • Log in

Product documentation

  • Home
How search works:
  • Punctuation and capital letters are ignored
  • Special characters like underscores (_) are removed
  • Known synonyms are applied
  • The most relevant topics (based on weighting and matching to search terms) are listed first in search results
Topics are ranked in search results by how closely they match your search terms
  • A match on the entire phrase you typed
  • A match on part of the phrase you typed
  • A match on ALL of the terms in the phrase you typed
  • A match on ANY of the terms in the phrase you typed

Note: Matches in titles are always highly ranked.

  • Release version
    Table of Contents
    • Security Operations
Table of Contents
Choose your release version
    Home Orlando Security Incident Management Security Operations Vulnerability Response Supported applications and setup for Vulnerability Response Additional Vulnerability Response setup tasks Configure and manage NVD, CWE, and third-party data libraries View Vulnerability Response vulnerability libraries Vulnerability Response vulnerability form fields

    Vulnerability Response vulnerability form fields

    • Save as PDF Selected topic Topic & subtopics All topics in contents
    • Unsubscribe Log in to subscribe to topics and get notified when content changes.
    • Share this page

    Vulnerability Response vulnerability form fields

    Vulnerabilities are created automatically when records are downloaded from the National Vulnerability Database (NVD), Common Weakness Enumeration (CWE), or third-party integrations and stored under Libraries in Vulnerability Response.

    NVD entry fields

    The imported fields in this table are read-only. Vulnerable Items (VIs), Vulnerable Software, and Vulnerability References are automatically associated and entries can be manually added.
    Field Description
    ID Identifier for this vulnerability entry.
    Risk rating

    (Hidden when no VIs are associated with the vulnerability)

    Quantified Risk Score separating vulnerable items into Critical, High, Medium, Low, and None. For more information on risk ratings, see Vulnerability Response calculators and vulnerability calculator rules.
    Note: This base Risk rating is not the same as the Solution record Risk rating.
    Risk score

    (Hidden when no VIs are associated with the vulnerability)

    Calculated amount of risk the vulnerable item poses to your environment.

    Note: This base Risk score is not the same as the Solution record Risk score.

    For more information, see Vulnerability Response calculators and vulnerability calculator rules.

    Severity Normalized degree of severity of this vulnerability. Severity maps are provided for NVD and with ServiceNow third-party integrations. For more information on creating or adjusting severity maps, see Create a Vulnerability Response severity map.
    Exploit exists Yes, if at least one exploit is associated with this vulnerability.
    Exploit skill level Lowest skill level required to exploit this vulnerability.
    Exploit attack vector

    Most vulnerable attack vector of the exploits for this vulnerability.

    Available when SAM NVD is enabled.

    Active VIs

    (Hidden when no VIs are associated with the vulnerability)

    Number of vulnerable items associated with this vulnerability, not in the Closed state. If there are no active VIs for this vulnerability, Risk Rating and Risk Score are not displayed.

    CWE entry Reference to the Common Weakness Enumeration element that this vulnerability best fits into.
    Date published Date the vulnerability was published.
    Last modified Date the vulnerability was last modified.
    Summary Description of the vulnerability.
    Vulnerability Details
    CVSS v2 Imported CVSS v2 data
    CVSS v3 Imported CVSS v3 data, not available prior to 2015.
    Preferred solution

    (Hidden when no VIs are associated with the vulnerability)

    Solution of the highest-supersedence in the chain, derived from the solutions referenced in the vulnerability. If more than one highest-supersedence exists in the chain, no value is set. Any value set manually can be overwritten on subsequent imports. Setting this value manually should be done on the vulnerable item.

    Remediation Status

    (Hidden when no VIs are associated with the vulnerability)

    Excludes Deferred
    Vulnerable items Number of active vulnerable items with this vulnerability. This count excludes deferred vulnerable items.
    Total VIs Total number of vulnerable items with this vulnerability. This count excludes deferred vulnerable items.
    %VIs remediated Percent complete for remediation of vulnerable items with this vulnerability. This count excludes deferred vulnerable items.
    Includes Deferred
    Vulnerable items Number of active vulnerable items with this vulnerability.
    Total VIs Total number of vulnerable items with this vulnerability.
    %VIs remediated Percent complete for remediation of vulnerable items with this vulnerability.
    Related Links
    Force software vulnerability import Re-calculates product mapping with ITSM Software Asset Management based on information from NVD. Updates the Vulnerable Software library.
    Version 10.0: Update status

    Displays date and time of the last update.

    Updates the following:
    • Vulnerability group state
    • Risk score and rating
    • Metrics such as Active VIs, Total VIs from the Remediation Status section
    Related Lists
    Vulnerable Items

    (Hidden when no VIs are associated with the vulnerability)

    Vulnerable items associated with this vulnerability.

    Vulnerability References Information about the vulnerability from external sources, cited by NVD.
    Exploits Exploits associated with this vulnerability.
    Solutions

    (Hidden when no VIs are associated with the vulnerability)

    All Vulnerability Solution Management integration solutions associated with this vulnerability.

    CWE vulnerability entry fields

    The imported fields in this table are read-only.

    Field Description
    CWE-ID Identifier for this vulnerability entry.
    Description Description of the vulnerability.
    Knowledge article Knowledge base article associated with this vulnerability.
    Name Descriptive name assigned to this CWE-ID.

    Third-party vulnerability entry fields

    The imported fields in this table are read-only.

    Field Description
    ID Identifier for this vulnerability entry.
    Source Origin of the vulnerability — whether a scanner or physical test.
    Risk rating Quantified Risk Score separating vulnerable items into Critical, High, Medium, Low and None. For more information on risk ratings see, Vulnerability Response calculators and vulnerability calculator rules.
    Note: This base Risk rating is not the same as the Solution record Risk rating
    Risk score
    Calculated amount of risk the vulnerable item poses to your environment, based on risk score.
    Note: This base Risk score is not the same as the Solution record Risk score.

    For more information, see Vulnerability Response calculators and vulnerability calculator rules.

    Severity Normalized degree of severity of this vulnerability. Severity maps are provided for NVD and with ServiceNow third-party integrations. For more information on creating or adjusting severity maps, see Create a Vulnerability Response severity map.
    Exploit exists Yes, if at least one exploit is associated with this vulnerability.
    Exploit skill level Lowest skill level required to exploit this vulnerability.
    Exploit attack vector Most vulnerable attack vector of the exploits for this vulnerability.
    Active VIs Number of vulnerable items associated with this vulnerability, not in the Closed state.
    Category Classification provided by the third-party integration. Aids in assignment.
    Remediation type Types of remediation actions.
    • Patch
    • Configuration change
    • Patch and Configuration change
    • Countermeasure
    CWE entry Reference to the Common Weakness Enumeration element that this vulnerability best fits into.
    PCI When the checkbox is selected, the vulnerability is flagged for significant risk for exposure of payment information.
    PCI severity Level of risk for exposure of payment information. [Qualys only.]
    Date published Date the vulnerability was published.
    Last modified Date the vulnerability was last modified.
    Summary Description of the vulnerability.
    Vulnerability Details
    CVSS v2 Imported CVSS v2 data
    CVSS v3 Imported CVSS v3 data, not available prior to 2015.
    Threat Description of the threat from this vulnerability.
    Preferred Solution Solution of the highest-supersedence in the chain, derived from the solutions referenced in the vulnerability. If more than one highest-supersedence exists in the chain, no value is set. Any value set manually can be overwritten on subsequent imports. Setting this value manually should be done on the vulnerable item.
    Remediation notes Description of the remediation solution pulled from the vendor.
    Remediation Status
    Excludes Deferred
    Vulnerable items Number of active vulnerable items with this vulnerability. This count excludes deferred vulnerable items.
    Total VIs Total number of vulnerable items with this vulnerability. This count excludes deferred vulnerable items.
    %VIs remediated Percent complete for remediation of vulnerable items with this vulnerability. This count excludes deferred vulnerable items.
    Includes Deferred
    Vulnerable items Number of active vulnerable items with this vulnerability.
    Total VIs Total number of vulnerable items with this vulnerability.
    %VIs remediated Percent complete for remediation of vulnerable items with this vulnerability.
    Related Links
    Version 10.0: Update status

    Displays date and time of the last update.

    Updates the following:
    • Vulnerability group state
    • Risk score and rating
    • Metrics such as Active VIs, Total VIs from the Remediation Status section
    Related Lists
    Vulnerable Items Vulnerable items associated with this vulnerability.
    Vulnerability References Information about the vulnerability from external sources, cited by NVD.
    CVEs Common Vulnerability Enumeration (CVE) record associated with this vulnerability.
    Categories Categories associated with this vulnerability.
    Exploits Exploits associated with this vulnerability.
    Vulnerability Malware Kits Malware kits associated with this vulnerability.
    Solutions (Rapid7) Solution information from the Rapid7 solution integrations. Displayed when available.
    Exploit Frameworks Exploit frameworks associated with this vulnerability.
    Solutions Vulnerability Solution Managementsolutions associated with this vulnerability.

    Tags:

    Feedback
    On this page

    Previous topic

    Next topic

    • Contact Us
    • Careers
    • Terms of Use
    • Privacy Statement
    • Sitemap
    • © ServiceNow. All rights reserved.

    Release version
    Choose your release version

      Vulnerability Response vulnerability form fields

      • Save as PDF Selected topic Topic & subtopics All topics in contents
      • Unsubscribe Log in to subscribe to topics and get notified when content changes.
      • Share this page

      Vulnerability Response vulnerability form fields

      Vulnerabilities are created automatically when records are downloaded from the National Vulnerability Database (NVD), Common Weakness Enumeration (CWE), or third-party integrations and stored under Libraries in Vulnerability Response.

      NVD entry fields

      The imported fields in this table are read-only. Vulnerable Items (VIs), Vulnerable Software, and Vulnerability References are automatically associated and entries can be manually added.
      Field Description
      ID Identifier for this vulnerability entry.
      Risk rating

      (Hidden when no VIs are associated with the vulnerability)

      Quantified Risk Score separating vulnerable items into Critical, High, Medium, Low, and None. For more information on risk ratings, see Vulnerability Response calculators and vulnerability calculator rules.
      Note: This base Risk rating is not the same as the Solution record Risk rating.
      Risk score

      (Hidden when no VIs are associated with the vulnerability)

      Calculated amount of risk the vulnerable item poses to your environment.

      Note: This base Risk score is not the same as the Solution record Risk score.

      For more information, see Vulnerability Response calculators and vulnerability calculator rules.

      Severity Normalized degree of severity of this vulnerability. Severity maps are provided for NVD and with ServiceNow third-party integrations. For more information on creating or adjusting severity maps, see Create a Vulnerability Response severity map.
      Exploit exists Yes, if at least one exploit is associated with this vulnerability.
      Exploit skill level Lowest skill level required to exploit this vulnerability.
      Exploit attack vector

      Most vulnerable attack vector of the exploits for this vulnerability.

      Available when SAM NVD is enabled.

      Active VIs

      (Hidden when no VIs are associated with the vulnerability)

      Number of vulnerable items associated with this vulnerability, not in the Closed state. If there are no active VIs for this vulnerability, Risk Rating and Risk Score are not displayed.

      CWE entry Reference to the Common Weakness Enumeration element that this vulnerability best fits into.
      Date published Date the vulnerability was published.
      Last modified Date the vulnerability was last modified.
      Summary Description of the vulnerability.
      Vulnerability Details
      CVSS v2 Imported CVSS v2 data
      CVSS v3 Imported CVSS v3 data, not available prior to 2015.
      Preferred solution

      (Hidden when no VIs are associated with the vulnerability)

      Solution of the highest-supersedence in the chain, derived from the solutions referenced in the vulnerability. If more than one highest-supersedence exists in the chain, no value is set. Any value set manually can be overwritten on subsequent imports. Setting this value manually should be done on the vulnerable item.

      Remediation Status

      (Hidden when no VIs are associated with the vulnerability)

      Excludes Deferred
      Vulnerable items Number of active vulnerable items with this vulnerability. This count excludes deferred vulnerable items.
      Total VIs Total number of vulnerable items with this vulnerability. This count excludes deferred vulnerable items.
      %VIs remediated Percent complete for remediation of vulnerable items with this vulnerability. This count excludes deferred vulnerable items.
      Includes Deferred
      Vulnerable items Number of active vulnerable items with this vulnerability.
      Total VIs Total number of vulnerable items with this vulnerability.
      %VIs remediated Percent complete for remediation of vulnerable items with this vulnerability.
      Related Links
      Force software vulnerability import Re-calculates product mapping with ITSM Software Asset Management based on information from NVD. Updates the Vulnerable Software library.
      Version 10.0: Update status

      Displays date and time of the last update.

      Updates the following:
      • Vulnerability group state
      • Risk score and rating
      • Metrics such as Active VIs, Total VIs from the Remediation Status section
      Related Lists
      Vulnerable Items

      (Hidden when no VIs are associated with the vulnerability)

      Vulnerable items associated with this vulnerability.

      Vulnerability References Information about the vulnerability from external sources, cited by NVD.
      Exploits Exploits associated with this vulnerability.
      Solutions

      (Hidden when no VIs are associated with the vulnerability)

      All Vulnerability Solution Management integration solutions associated with this vulnerability.

      CWE vulnerability entry fields

      The imported fields in this table are read-only.

      Field Description
      CWE-ID Identifier for this vulnerability entry.
      Description Description of the vulnerability.
      Knowledge article Knowledge base article associated with this vulnerability.
      Name Descriptive name assigned to this CWE-ID.

      Third-party vulnerability entry fields

      The imported fields in this table are read-only.

      Field Description
      ID Identifier for this vulnerability entry.
      Source Origin of the vulnerability — whether a scanner or physical test.
      Risk rating Quantified Risk Score separating vulnerable items into Critical, High, Medium, Low and None. For more information on risk ratings see, Vulnerability Response calculators and vulnerability calculator rules.
      Note: This base Risk rating is not the same as the Solution record Risk rating
      Risk score
      Calculated amount of risk the vulnerable item poses to your environment, based on risk score.
      Note: This base Risk score is not the same as the Solution record Risk score.

      For more information, see Vulnerability Response calculators and vulnerability calculator rules.

      Severity Normalized degree of severity of this vulnerability. Severity maps are provided for NVD and with ServiceNow third-party integrations. For more information on creating or adjusting severity maps, see Create a Vulnerability Response severity map.
      Exploit exists Yes, if at least one exploit is associated with this vulnerability.
      Exploit skill level Lowest skill level required to exploit this vulnerability.
      Exploit attack vector Most vulnerable attack vector of the exploits for this vulnerability.
      Active VIs Number of vulnerable items associated with this vulnerability, not in the Closed state.
      Category Classification provided by the third-party integration. Aids in assignment.
      Remediation type Types of remediation actions.
      • Patch
      • Configuration change
      • Patch and Configuration change
      • Countermeasure
      CWE entry Reference to the Common Weakness Enumeration element that this vulnerability best fits into.
      PCI When the checkbox is selected, the vulnerability is flagged for significant risk for exposure of payment information.
      PCI severity Level of risk for exposure of payment information. [Qualys only.]
      Date published Date the vulnerability was published.
      Last modified Date the vulnerability was last modified.
      Summary Description of the vulnerability.
      Vulnerability Details
      CVSS v2 Imported CVSS v2 data
      CVSS v3 Imported CVSS v3 data, not available prior to 2015.
      Threat Description of the threat from this vulnerability.
      Preferred Solution Solution of the highest-supersedence in the chain, derived from the solutions referenced in the vulnerability. If more than one highest-supersedence exists in the chain, no value is set. Any value set manually can be overwritten on subsequent imports. Setting this value manually should be done on the vulnerable item.
      Remediation notes Description of the remediation solution pulled from the vendor.
      Remediation Status
      Excludes Deferred
      Vulnerable items Number of active vulnerable items with this vulnerability. This count excludes deferred vulnerable items.
      Total VIs Total number of vulnerable items with this vulnerability. This count excludes deferred vulnerable items.
      %VIs remediated Percent complete for remediation of vulnerable items with this vulnerability. This count excludes deferred vulnerable items.
      Includes Deferred
      Vulnerable items Number of active vulnerable items with this vulnerability.
      Total VIs Total number of vulnerable items with this vulnerability.
      %VIs remediated Percent complete for remediation of vulnerable items with this vulnerability.
      Related Links
      Version 10.0: Update status

      Displays date and time of the last update.

      Updates the following:
      • Vulnerability group state
      • Risk score and rating
      • Metrics such as Active VIs, Total VIs from the Remediation Status section
      Related Lists
      Vulnerable Items Vulnerable items associated with this vulnerability.
      Vulnerability References Information about the vulnerability from external sources, cited by NVD.
      CVEs Common Vulnerability Enumeration (CVE) record associated with this vulnerability.
      Categories Categories associated with this vulnerability.
      Exploits Exploits associated with this vulnerability.
      Vulnerability Malware Kits Malware kits associated with this vulnerability.
      Solutions (Rapid7) Solution information from the Rapid7 solution integrations. Displayed when available.
      Exploit Frameworks Exploit frameworks associated with this vulnerability.
      Solutions Vulnerability Solution Managementsolutions associated with this vulnerability.

      Tags:

      Feedback

          Share this page

          Got it! Feel free to add a comment
          To share your product suggestions, visit the Idea Portal.
          Please let us know how to improve this content

          Check any that apply

          To share your product suggestions, visit the Idea Portal.
          Confirm

          We were unable to find "Coaching" in Jakarta. Would you like to search instead?

          No Yes
          • Contact Us
          • Careers
          • Terms of Use
          • Privacy Statement
          • Sitemap
          • © ServiceNow. All rights reserved.

          Subscribe Subscribed Unsubscribe Last updated: Tags: January February March April May June July August September October November December No Results Found Versions Search preferences successfully updated My release version successfully updated My release version successfully deleted An error has occurred. Please try again later. You have been unsubscribed from all topics. You are now subscribed to and will receive notifications if any changes are made to this page. You have been unsubscribed from this content Thank you for your feedback. Form temporarily unavailable. Please try again or contact  docfeedback@servicenow.com  to submit your comments. The topic you requested does not exist in the release. You were redirected to a related topic instead. The available release versions for this topic are listed There is no specific version for this documentation. Explore products Click to go to the page. Release notes and upgrades Click to open the dropdown menu. Delete Remove No selected version Reset This field is required You are already subscribed to this topic Attach screenshot The file you uploaded exceeds the allowed file size of 20MB. Please try again with a smaller file. Please complete the reCAPTCHA step to attach a screenshot
          Log in to personalize your search results and subscribe to topics
          No, thanks Login