Table27. Vulnerability view by detail (continued)
Field Description
Object Type Usethis filter to analyze a specific type of
object that you suspect is the target of
attacks.
Object Name Use this filter to see events involving a
specific object according to the object’s
name.
User Name Use this filter to display or suppress events
that match the User Name, if any,associated
with an event.
CVSS Base Use this filter to assess qualities intrinsic to a
vulnerability,such as:
vIs the vulnerability exploitable remotely
(as opposed to only locally).
vHow complex must an attack be to exploit
the vulnerability?
vIs authentication required to attack?
vDoes the vulnerability expose confidential
data?
vCan attacking the vulnerability damage
the integrity of the system?
vDoes it impact availability of the system?
CVSS Temporal Use this filter to assess characteristics that
evolve over the lifetime of the vulnerability.
vHow complex (or how long will it take) to
exploit the vulnerability?
vHow hard (or how long) will it take to
remediate the vulnerability?
vHow certain is the existence of the
vulnerability?
CVSS Score Use this filter to establish a measure of how
much concern a vulnerability warrants,
compared to other vulnerabilities, so that
efforts to remedy the vulnerability can be
prioritized.
Source Port The port on which the vulnerability was
detected.
112 Enterprise Scanner: User Guide