Your FixTheCVE dashboard is your security command center. This guide walks you through every feature so you can get the most out of your vulnerability monitoring.
Dashboard Overview
When you log in to your dashboard, you see a bird's-eye view of your security posture:
- Total systems: How many servers you've scanned
- Open vulnerabilities: Total unpatched CVEs across all systems
- Critical/High counts: The ones that need immediate attention
- Security score: An overall rating from A+ to F based on your vulnerability density and severity
Managing Your Systems
Go to Dashboard > Systems to see all your scanned servers. For each system you can see:
- OS and version: Ubuntu 24.04, Rocky Linux 9, Windows Server 2022, etc.
- Package count: Total installed packages we're monitoring
- Last scanned: When the system was last checked
- CVE counts by severity: Quick visual breakdown
System Detail Page
Click any system to see its complete vulnerability report:
- Unpatched CVEs: Every CVE affecting this specific system, sorted by severity
- Package list: All installed packages with their versions
- Fix availability: Which CVEs have patches available in your distro
- Remediation commands: Copy-paste commands to fix specific vulnerabilities
CVE Details
Click any CVE in your dashboard to see its full profile:
- CVSS score and vector: Understand the severity breakdown (attack vector, complexity, privileges required)
- EPSS score: The probability of this CVE being exploited in the next 30 days
- CISA KEV status: Whether this CVE is confirmed to be actively exploited
- AI-powered analysis: Plain-English summary, risk assessment, and step-by-step fix instructions
- Affected products: All software versions affected
- References: Links to vendor advisories, patches, and exploit databases
Product Monitoring (My Stack)
Beyond server scanning, you can monitor specific products:
- Go to My Stack
- Search for software you use (e.g., "nginx", "PostgreSQL", "Apache")
- Add them to your monitoring stack
- Get alerted when new CVEs affect those products, even if they're not installed via package managers
This is especially useful for software installed from source, containers, or third-party repositories that your package manager doesn't track.
Alert Configuration
Fine-tune your notifications in Alert Settings:
Severity Filter
Choose which severity levels trigger alerts:
- Critical only: Minimal noise, only the most severe vulnerabilities
- Critical + High: Recommended for most teams
- All severities: Complete coverage, higher volume
Alert Types
- Instant: Email within minutes of a new CVE affecting your systems
- Daily digest: One summary email per day at your preferred time
- Weekly roundup: Weekly summary every Sunday
Security Metrics
The Security Metrics page gives you trend data:
- Vulnerability count over time: Are you improving or falling behind?
- Mean time to patch: How quickly you're addressing new CVEs
- Severity distribution: Visual breakdown of your exposure
Tips for Getting the Most Out of FixTheCVE
- Scan regularly: Set up automated scans every 6-12 hours so your data is always fresh
- Prioritize by EPSS: Don't just sort by CVSS—use EPSS to find CVEs most likely to be exploited
- Check CISA KEV: If a CVE is on the Known Exploited Vulnerabilities list, patch it immediately
- Use My Stack: Monitor products beyond what your package manager tracks
- Review weekly: Spend 15 minutes each week reviewing your dashboard and addressing new vulnerabilities
Need help? Check our FAQ or contact us. We're here to help you stay secure.