Analyzing Vulnerability Details
Vulnerability Analytics
Viewing Issue Details
The Vulnerabilities Analytics page provides a consolidated view of your organization’s current security weaknesses. It gathers and visualizes vulnerability data across monitored applications so you can quickly see where risks reside, which issues are most severe and how remediation efforts are progressing.
Key Metrics
Metric | Meaning & Interpretation |
---|---|
Total Vulnerabilities | Shows the number of open vulnerabilities across all scanned systems and any change since the previous. A rising number indicates new vulnerabilities being discovered faster than they’re being resolved. |
Critical Issues | Indicates how many vulnerabilities are rated “critical.” This highlights the most severe issues requiring immediate attention. |
Resolution Rate | Displays the percentage of vulnerabilities that have been fixed within the period. |
Average Resolution Time | Shows the average time it takes to remediate vulnerabilities. |
Security Score | A gauge summarizing the organization’s overall security posture based on open vulnerabilities. |
Top Affected Systems
A table lists the systems or subdomains with the highest counts of vulnerabilities. Colored bars indicate the severity distribution (critical/high/medium/low). This helps prioritize remediation by showing which systems are most affected and the proportion of severe issues.
Highest Severity Issues
A list highlights specific vulnerabilities with the highest severity ratings (e.g., 9.8 for SQL Injection and 7.5 for a vulnerable JS library)dashboard.selki.io. Each entry notes the severity category (critical, high, medium) and the affected system. This allows security teams to quickly focus on the most dangerous flaws, such as SQL injection or missing CSRF tokens.
Severity Distribution
A donut chart summarizes how the total vulnerabilities break down by severity levels (critical, high, medium, low and informational). For example, an organization may have most issues in the medium range, a smaller portion of critical issues and a few informational findings. This distribution gives a snapshot of overall risk.
Vulnerability Trend
A line graph shows the number of active vulnerabilities over time. A spike on the chart could indicate a large batch of vulnerabilities discovered or a new scan run. Monitoring the trend helps assess whether remediation efforts are reducing risk or if new issues are emerging faster than they can be fixed.
Using the Analytics Page
- Prioritize Critical Issues – Focus first on entries under the Critical Issues and Highest Severity Issues sections. Address these vulnerabilities promptly to reduce the highest risk.
- Monitor Affected Systems – Review systems with the largest number of issues and allocate resources accordingly. If a particular domain consistently appears at the top of this list, it may require deeper security review or improved development practices.
- Track Remediation Effectiveness – Use the Resolution Rate and Average Resolution Time to measure how efficiently vulnerabilities are being resolved. Aim to improve these metrics over time.
- Identify Trends – Examine the Vulnerability Trend graph to determine whether vulnerability counts are going up or down. A downward trend indicates progress; a rising trend suggests new issues are being uncovered or not enough resources are allocated to fix them.
- Review Severity Distribution – A distribution heavily skewed toward high or critical severities signals an urgent need for remediation. A more balanced or low-severity distribution suggests a better-controlled risk profile.
By regularly reviewing this analytics page, security teams can stay informed about the current risk posture, prioritize remediation efforts effectively and demonstrate progress to stakeholders.
Updated on: 15/09/2025
Thank you!