Articles on: Vulnerabilities

Vulnerability Issues

Understanding the Vulnerabilities Page


The Vulnerabilities page is your centralized dashboard for tracking, assessing, and responding to security issues discovered through vulnerability scans.


This guide walks you through the main page layout and how to drill into individual issues for remediation guidance.


Main Vulnerabilities Dashboard


This page provides a real-time overview of all detected vulnerabilities, filtered by severity, status, and other relevant fields.


Vulnerability Issues


Key Features:

1. Issues List

Use this section to:

  • Toggle between Open Issues and Closed Issues
  • Filter by Severity levels:
    • 🔴 Critical
    • 🔶 High
    • 🟠 Medium
    • 🟡 Low
    • 🔵 Log

Each category shows a badge with the number of matching issues.


2. Search & Sort

At the top, use the search bar to filter by:

  • Issue name
  • Severity
  • Status
  • Date

You can also click on column headers (e.g., Score, QoD, Observed At) to sort the list.


3. Issue Table

Each row includes:

  • Summary: Name of the vulnerability (clickable to view details)
  • Status: Open or Closed
  • Severity: From Log to Critical
  • Score: Often based on CVSS (0–10 scale)
  • QoD: Quality of Detection (how confident the system is)
  • Observed At: When the issue was detected

Updated on: 08/08/2025

Was this article helpful?

Share your feedback

Cancel

Thank you!