
You can view the most frequent vulnerabilities on your network from the Your Top 10 Vulnerabilities screen. It displays the names of ten vulnerabilities on your network and the number of machines that have the vulnerability. It also gives some brief details about the vulnerabilities.
You can view the following detailed information:
Rank: This displays the rank from 1 to 10.
Damage Potential: The damage potential is the based on the damage that the vulnerability presents to the machine on which it is located. When there is a high level or number of damage potential on a machine, VAS shows a high level risk to the network (such as critical or important).
Vulnerability Title: The title gives a brief description of the vulnerability and the possible consequences of having that vulnerability.
Vulnerability Name: The name Vulnerability Assessment uses is an industry standard. This makes it easy to obtain further information on the vulnerability and quickly learn how to resolve it.
Machine Count: The number of machines that have this vulnerability.
Potential Malware: The virus that frequently exploits this vulnerability. Vulnerability Assessment uses an industry standard name to make it easy to obtain further information on the virus.
Affected Software: This is a list of software that the vulnerability is known to affect.