# Vulnerabilities by CVE

CVE (Common Vulnerabilities and Exposures) is a standardized system for identifying vulnerabilities. This module categorizes vulnerabilities by CVE IDs, allowing teams to evaluate severity using CVSS scores and implement rule-based responses.

## **What do you see on the screen**

**Action Icons |** Vulnerabilities by CVE |

<table data-header-hidden><thead><tr><th width="170"></th><th></th><th></th></tr></thead><tbody><tr><td><strong>Label</strong></td><td><strong>Action</strong></td><td><strong>Description</strong></td></tr><tr><td>Resolve Vulnerabilities</td><td>Click to resolve the vulnerabilities. Add a comment for resolution.</td><td>Resolves vulnerabilities for the selected vendor, indicating affected devices and the associated CVE ID.</td></tr><tr><td>Command Execution Job</td><td>Click to initiate the command execution for the selected vendor.</td><td>To run a Command Execution Job, users must configure a script execution by selecting the IP address, configuration template, agent, and job type. Device account details, including the username, password, and enable password, must also be provided.</td></tr></tbody></table>

Below is the list of fields that can be viewed from this page:

* Vendor
* OS Name
* CVE ID
* Advisory ID
* Title
* Severity
* CVSS Score
* Published Date
* Total Vulnerabilities
* Total Devices
* Is Resolved
* Work Around Available
