Views:
Search for CVEs imported on the SMS vulnerability scan database. You can review the vulnerabilities identified in your network, sorted by CVE, and which assets are impacted by these vulnerabilities.

Procedure

  1. Select ProfilesVulnerability Scans (eVR)CVE Search.
  2. Click Scan Criteria to search for:
    Select this criteria: To search for ...
    Scans
    • Select All to perform a global search through all imported vulnerability scans.
    • Select the check box next to the vulnerability scan for a specific file.
    Scan Vendor
    • Select Any to search for a supported vendor.
    Scan Time
    Start and end dates for when the vulnerability scan was generated.
    Start time:
    • Select Start Time to enter a date in MM/DD/YY HH:MM format.
    • Select Start Time, click the calendar icon to select a date/time from the calendar, and click OK.
    End time:
    • Select End Time to enter a date in MM/DD/YY HH:MM format.
    • Select End Time, click the calendar icon to select a date/time from the calendar, and click OK.
    Import Time
    Start and end dates for when the vulnerability scan was imported on the SMS.
    Start time:
    • Select Start Time to enter a date in MM/DD/YY HH:MM format.
    • Select Start Time, click the calendar icon to select a date/time from the calendar, and click OK.
    End time:
    • Select End Time to enter a date in MM/DD/YY HH:MM format.
    • Select End Time, click the calendar icon to select a date/time from the calendar, and click OK.
  3. Click CVE Criteria to search for:
    Select this criteria: To search for ...
    CVE Details
    • Unique tracking number used to identify a Common Vulnerabilities and Exposures (CVE).
    Discovered Time
    Start and end dates for when the CVE vulnerability was discovered.
    Start time:
    • Select Start Time to enter a date in MM/DD/YY HH:MM format.
    • Select Start Time, click the calendar icon to select a date/time from the calendar, and click OK.
    End time:
    • Select End Time to enter a date in MM/DD/YY HH:MM format.
    • Select End Time, click the calendar icon to select a date/time from the calendar, and click OK.
    Assets
    • One or more IP addresses for an asset. An asset is the network IP address of the host vulnerable to the CVE identified in the vulnerability scan.
    Flagged Status
    • Flagged - All CVEs that are flagged for follow-up.
    • Not Flagged - All CVEs that are not flagged.
  4. Click Search.