TOC & Recently Viewed

Recently Viewed Topics

Vulnerability Filters

On the Vulnerabilities page, you can filter vulnerabilities using Tenable-provided filters and filters based on asset tags.

Tenable-provided Filters

Tenable.io provides the following vulnerability filters:

Filter Description
Asset ID The UUID of the asset where a scan detected the vulnerability. This value is unique to Tenable.io.
Bugtraq ID The Bugtraq ID for the plugin that identified the vulnerability.
CANVAS Exploit Framework Indicates whether an exploit for the vulnerability exists in the Immunity CANVAS framework.
CANVAS Package The name of the CANVAS exploit pack that includes the vulnerability.
CERT Advisory ID The ID of the CERT advisory related to the vulnerability.
CERT Vulnerability ID The ID of the vulnerability in the CERT Vulnerability Notes Database.
CORE Exploit Framework Indicates whether an exploit for the vulnerability exists in the CORE Impact framework.
CPE The Common Platform Enumeration (CPE) number for the plugin that identified the vulnerability.
CVE The Common Vulnerability and Exposure (CVE) ID for the plugin that identified the vulnerability.
CVSS Base Score The CVSSv2 base score (intrinsic and fundamental characteristics of a vulnerability that are constant over time and user environments).
CVSS Temporal Score The CVSSv2 temporal score (characteristics of a vulnerability that change over time but not among user environments).
CVSS Temporal Vector CVSSv2 temporal metrics for the vulnerability.
CVSS Vector Additional CVSSv2 metrics for the vulnerability.
CVSS v3.0 Base Score The CVSSv3 base score (intrinsic and fundamental characteristics of a vulnerability that are constant over time and user environments).
CVSS v3.0 Temporal Score The CVSSv3 temporal score (characteristics of a vulnerability that change over time but not among user environments).
CVSS v3.0 Temporal Vector CVSSv3 temporal metrics for the vulnerability.
CVSS v3.0 Vector Additional CVSSv3 metrics for the vulnerability.
CWE The Common Weakness Enumeration (CWE) for the vulnerability.
Check Name The description of the compliance check that detected the vulnerability.
Compliance Reference The name of the reference file the scan used for the compliance check.
Default/Known Accounts Indicates whether the plugin that identified the vulnerability checks for default accounts.
Elliot Exploit Framework Indicates whether an exploit for the vulnerability exists in the D2 Elliot Web Exploitation framework.
Elliot Exploit Name The name of the exploit for the vulnerability in the D2 Elliot Web Exploitation framework.
Exploit Available Indicates whether a public exploit exists for the vulnerability.
Exploit Database ID The ID of the vulnerability in the Exploit Database.
ExploitHub Indicates whether an exploit for the vulnerability exists in the ExploitHub framework.
Exploitability Ease Description of how easy it is to exploit the vulnerability.
Exploited by Malware Indicates whether the vulnerability is known to be exploited by malware.
Exploited by Nessus Indicates whether Nessus exploited the vulnerability during the process of identification.
Hostname/IP Address The host name of the asset where a scan found the vulnerability.
IAVA ID The ID of the information assurance vulnerability alert (IAVA) for the vulnerability.
IAVB ID The ID of the information assurance vulnerability bulletin (IAVB) for the vulnerability.
IAVM Severity The severity of the vulnerability in Information Assurance Vulnerability Management (IAVM).
IAVT ID The ID of the information assurance vulnerability technical bulletin (IAVT) for the vulnerability.
In the News Indicates whether this plugin has received media attention (for example, ShellShock, Meltdown).
Malware Indicates whether the plugin that identified the vulnerability checks for malware.
Metasploit Exploit Framework Indicates whether an exploit for the vulnerability exists in the Metasploit framework.
Metasploit Name The name of the related exploit in the Metasploit framework.
Microsoft Bulletin The Microsoft security bulletin that the plugin that identified the vulnerability covers.
OSVDB ID The ID of the vulnerability in the Open Sourced Vulnerability Database (OSVDB).
Patch Publication Date The date on which the vendor published a patch for the vulnerability.
Plugin Description The description of the Tenable plugin that identified the vulnerability.
Plugin Family The plugin family of the exported vulnerabilities.
Plugin ID The ID of the plugin that identified the vulnerability.
Plugin Modification Date The date on which the plugin was last modified.
Plugin Name The name of the plugin that identified the vulnerability.
Plugin Output The text output of the Nessus scanner that identified the vulnerability.
Plugin Publication Date The date on which the plugin that identified the vulnerability was published.
Plugin Type The general type of plugin check (for example, local or remote).
Port Information about the port the scanner used to connect to the asset where the scan detected the vulnerability.
Protocol The protocol the scanner used to communicate with the asset where the scan detected the vulnerability.
Recast & Accept Indicates whether the vulnerability is affected by a recast or accept rule.
Secunia ID The ID of the Secunia research advisory related to the vulnerability.
See Also Links to external websites that contain helpful information about the vulnerability.
Severity

The severity of the vulnerability as defined using the Common Vulnerability Scoring System (CVSS) base score. Possible values include:

  • info—CVSS score of 0
  • low—CVSS score between 0.1 and 3.9
  • medium—CVSS score between 4.0 and 6.9
  • high—CVSS score between 7.0 and 9.9
  • critical—CVSS score of 10.0
Solution Remediation information for the vulnerability.
Synopsis Brief description of the plugin or vulnerability.
Target Group A target group. For more information, see Target Groups.
Unsupported By Vendor Software found by this plugin is unsupported by the software's vendor (for example, Windows 95 or Firefox 3).
Vulnerability First Seen The date when a scan first found the vulnerability on an asset.
Vulnerability Last Seen The date when a scan last found the vulnerability on an asset.
Vulnerability Priority Rating (VPR) The VPR that Tenable calculates for the vulnerability. For more information, see Risk Metrics.
Vulnerability Publication Date The date when the vulnerability definition was first published (for example, the date that the CVE was published).
Vulnerability State The state of the vulnerability. For more information, see Vulnerability States.

Tag Filters

In Tenable.io, tags allow you to add descriptive metadata to assets that helps you group assets by business context. For more information, see Tags.

On both the By Plugin and By Asset tabs of the Vulnerabilities page, you can filter vulnerabilities by tags applied to the related assets.

In the Category drop-down box for a filter, your organization's tags appear at the bottom of the list, after the Tenable-provided filters.

If you want to export vulnerabilities filtered by tag, use the CSV export format. Tag filters are not supported in other export formats.

Note: If you exceed the current asset query limitations, a message appears in your interface. You should refine the query to a smaller set of asset tags.

Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.