Findings Columns

On the Findings tab in Explore, you can view the findings in your environment broken down into categories including vulnerabilities, the results of host audits, and web application findings.

The Findings tab has the following columns, which you can show or hide as described in Use Tables. When displaying columns or exporting values for a finding, the available column names vary by finding type. This table clarifies the columns you can display or export for each respective finding type.

Column Finding Type(s) Description
Account ID Vulnerabilities

The unique identifier assigned to the asset resource in the cloud service that hosts the asset.

ACR Vulnerabilities

(Requires Tenable One or Tenable Lumin license) The Tenable-defined Asset Criticality Rating (ACR) as an integer from 1 to 10.

AES Vulnerabilities

(Requires Tenable One or Tenable Lumin license) The Tenable-defined Asset Exposure Score as an integer from 0 to 1000.

AI/LLM Tools Vulnerabilities, Web Application Findings

Indicates an informational finding about artificial intelligence services running on an asset. Hover on the AI/LLM Tools column to view details.

Asset ID All

The UUID of the asset where a scan detected the finding. This value is unique to Tenable Vulnerability Management.

Asset Name All

The name of the asset. This value is unique to Tenable Vulnerability Management.

Audit File Host Audits

The name of the audit file the scanner used to perform the compliance check.

Audit Name Host Audits

The name of the compliance check the scanner performed on the affected asset.

Control ID Host Audits

An ID for correlating results with other results that meet a certain benchmark recommendation. You can use this filter to identify checks in the audit portal.

CVSSv2 Base Score Vulnerabilities, Web Application Findings

The CVSSv2 base score (intrinsic and fundamental characteristics of a vulnerability that are constant over time and user environments). Tenable Vulnerability Management shows the CVSSv2 or CVSSv3 column depending on the Vulnerability Severity Metric setting.

CVSSv3 Base Score Vulnerabilities, Web Application Findings

The CVSSv3 base score (intrinsic and fundamental characteristics of a vulnerability that are constant over time and user environments). Tenable Vulnerability Management shows the CVSSv2 or CVSSv3 column depending on the Vulnerability Severity Metric setting.

CVSSv4 Base Score Vulnerabilities, Web Application Findings

The CVSSv4 base score (intrinsic and fundamental characteristics of a vulnerability that are constant over time and user environments). To learn more, see the CVSSv4 specification.

Description All If present, a description of the vulnerability corresponding to the finding.
EPSS Vulnerabilities EPSS Score. The percentage likelihood that a vulnerability will be exploited in the wild.
Finding ID Host Audits, Web Application Findings A unique identifier for a security issue. Each security issue identified by Tenable One is assigned a unique Finding ID. This ID helps to track and manage individual findings throughout their lifecycle.
Fix Vulnerabilities The fix available for the detected vulnerability.
Fix Type Vulnerabilities The type of fix, for example, version.
First Seen Vulnerabilities, Web Application Findings

The date when a scan first found the vulnerability on an asset.

IPv4 Address Vulnerabilities, Web Application Findings

The IPv4 address for the affected asset.

IPv6 Address Vulnerabilities

The IPv6 address for the affected asset.

Last Audited Host Audits Date of the most recent compliance check that was performed on the asset.
Last Authenticated Scan Vulnerabilities The time and date that a credentialed scan was last performed on the asset.
Last Fixed Vulnerabilities

The last time a previously detected vulnerability was scanned and noted as no longer present on an asset.

Last Scan Target Vulnerabilities The IP address or fully qualified domain name (FQDN) of the asset targeted in the last scan.
Last Seen Vulnerabilities, Web Application Findings

The date when a scan last found the vulnerability on an asset.

Live Result Vulnerabilities

Indicates whether the scan result is based on live results. In Agentless Assessment, you can use live results to view scan results for new plugins based on the most recently collected snapshot data, without running a new scan. The possible values are Yes or No.

Operating System Host Audits The result from the initial audit.
Operating Systems Vulnerabilities, Web Application Findings The result from the initial audit.
Original Result Host Audits The result from the initial audit.
Path Vulnerabilities The complete installation path of the software where a vulnerability was detected.
Plugin Family Vulnerabilities, Web Application Findings

The family of the plugin that identified the vulnerability.

Plugin ID Vulnerabilities, Web Application Findings

The ID of the plugin that identified the vulnerability.

Plugin Name All

The name of the plugin that identified the vulnerability. Hover on the icon to view a detailed summary that includes metrics and plugin output.

Port Vulnerabilities

The port that the scanner used to connect to the asset where the scan detected the vulnerability.

Product Vulnerabilities The name of the product on which the vulnerability was detected.
Product Type Vulnerabilities The type of product, for example, Application.
Protocol Vulnerabilities

The protocol the scanner used to communicate with the asset where the scan detected the vulnerability.

Region Vulnerabilities

The cloud region where the asset runs.

Result Host Audits The current or modified result from the audit check.
Result Modified Reason Host Audits Explanation for why the result of a compliance check was modified.
Result Modified Expires Host Audits Date the modified compliance check result will expire.
Resurfaced Date Vulnerabilities, Web Application Findings

The most recent date that a scan detected a Resurfaced vulnerability which was previously Fixed. If a vulnerability is Resurfaced multiple times, only the most recent date appears.

Scan Origin Vulnerabilities

The scanner that detected the finding. Also identifies if the scan is a work-load scan. Possible values for this column are: Tenable Vulnerability Management, Tenable Security Center, and Agentless Assessment.

Severity Vulnerabilities, Web Application Findings

The vulnerability's CVSS-based severity. For more information, see CVSS vs. VPR.

State Vulnerabilities, Web Application Findings

The state of the vulnerability. For more information, see Vulnerability States.

Tags All

Asset tags, entered in pairs of category and value (for example Network: Headquarters). This includes the space after the colon (:). If there is a comma in the tag name, insert a backslash (\) before the comma. If your tag name includes double quotation marks (" "), use the UUID instead. You can add a maximum of 100 tags.

For more information, see Tags.

Time Taken to Fix Vulnerabilities

How long it took your organization to fix a vulnerability identified on a scan in days. Only appears for Fixed vulnerabilities. Use this filter along with the State filter set to Fixed for more accurate results. When exported, this field is shown in milliseconds.

Vendor Vulnerabilities The vendor who makes the product on which the vulnerability was identified, for example, Apache.
Vendor Severity Vulnerabilities The severity of a vulnerability as assigned by a CVE Numbering Authority (CNA). Unlike a National Vulnerability Database (NVD) score, which reflects the worst-case scenario, this rating accounts for mitigations.
Version Vulnerabilities The version of the product on which the vulnerability was identified.
VPR Vulnerabilities, Web Application Findings

A descriptive icon indicating the VPR of the vulnerability. For more information, see CVSS vs. VPR.

VPR (Beta) Vulnerabilities, Web Application Findings

A descriptive icon indicating the VPR (Beta) of the vulnerability. For more information, see CVSS vs. VPR.

Vuln SLA Date Vulnerabilities, Web Application Findings The date that the finding was last activated. It equals either the First Seen date when the finding is new or active or the Resurfaced Date if the finding is resurfaced.