Vulnerability Details Page

Modified on Tue, 14 Apr at 4:32 PM

  • The Vulnerability Details page provides a complete view of an individual vulnerability record, allowing users to review all relevant information related to the identified weakness. 

This page presents the vulnerability in a structured format to support clear understanding, consistent tracking, and effective governance. 

Purpose 

The Vulnerability Details page helps stakeholders understand the nature of the vulnerability, its impact level, and who is responsible forreviewing or managing it. 

It ensures all relevant information is accessible in one place for reference and follow-up actions. 

Information Displayed 

The vulnerability details page presents the information captured when the vulnerability was created, including: 

  • Vulnerability Title – name used to identify the vulnerability 
  • Description – summary explaining the identified weakness 
  • Vulnerability Type – classification category 
  • Severity Level – impact level of the vulnerability 
  • Status – current stage of the vulnerability 
  • Detected Date – when the vulnerability was identified 
  • Related AI System or Dataset – associated asset where applicable 
  • Owner or Assignee – person responsible for managing the vulnerability 
  • Created Date – when the vulnerability record was added 

How it Helps 

The Vulnerability Details page allows users to: 

  • review the full context of the vulnerability 
  • confirm classification and severity level 
  • identify ownership and responsibility 
  • monitor the current status of the vulnerability 
  • maintain a structured record for governance and review purposes 

Notes 

  • Vulnerability information is displayed in a consistent format 
  • Records can be reviewed at any time for reference 
  • Maintaining accurate details supports effective tracking and governance 

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article