Vulnerability Management Dashboard Essentials Part 3

Mannu Aggarwal
2 min readJul 11, 2023

--

Let’s complete remaining points regarding Vulnerability Management Dashboards.

  1. Reopened vulnerabilities status: Vulnerabilities which were fixed earlier but as per current status, coming as active or open. There are several reason why vulnerability re-opened that we will discuss in another story.
  2. Unique vulnerabilities by severity: Unique vulnerabilities count which are available in your environment irrespective that vulnerability makes vulnerable 20 assets or 1000 assets.
  3. OWASP top 10 vulnerabilities: These vulnerabilities will have some specific properties like SQL injection, Remote code execution, privilege escalation etc.
  4. Application related vulnerabilities: Vulnerabilities which are present due to application software running with vulnerable version. That can be microsoft store application or an individual application Like zoom, java etc
  5. Operating system level vulnerabilities: Vulnerabilities except application related vulnerabilities or vulnerabilities which directly related to operating system that fixed by any patches or registry re-configuration.
  6. Application servers vulnerabilities: Servers which have hosted application like sharepoint, exchange , .net asp etc. These type of server’s hosted application related vulnerabilities will fix in Quarterly or monthly cycle or some other parameter like if vulnerability go critical or high then we have to fix it.
  7. Exploitable Vulnerability: That will tell you if the vulnerability has any exploit which directly available over internet that will help you to prioritize your vulnerabilities remediation part.
  8. Remote code Execution vulnerability / Potential exploit: Let’s understand it like a vulnerability which can be exploit through remotely or no physical interaction require to exploit that vulnerability.
  9. PCI Status(Payment Card industry): This the standard help us to monitor vulnerabilities which are coming due to running money related or bank’s hosted application over servers. That will monitored by few organization for ensure vendor fulfilling the standard or not.
  10. Weaponization vulnerability: Vulnerabilities which can help to exploit other vulnerabilities which are not exploitable alone, comes under wepanization. If i tell this term comes from CKC.
  11. Assets which are not scanned from last 30 days: That will help you to know like asset decommissioned from network or any other reason agent service or demon is not working. Like sanitization your evoirnment.

Comment in the story if you like to know how to create dashboard through Qualys query language or Rapid7 Query, will discuss in another story…………………

Thanks

--

--

Mannu Aggarwal
Mannu Aggarwal

Written by Mannu Aggarwal

I am managing vulnerabilities and assessment smartly I enjoy using my skills to contribute to the exciting technological advance. I am here to share my thoughts

No responses yet