Vulnerability Issues
Understanding the Vulnerabilities Page
The Vulnerabilities page is your centralized dashboard for tracking, assessing, and responding to security issues discovered through vulnerability scans.
This guide walks you through the main page layout and how to drill into individual issues for remediation guidance.
Main Vulnerabilities Dashboard
This page provides a real-time overview of all detected vulnerabilities, filtered by severity, status, and other relevant fields.
Key Features:
1. Issues List
Use this section to:
- Toggle between Open Issues and Closed Issues
- Filter by Severity levels:
- 🔴 Critical
- 🔶 High
- 🟠Medium
- 🟡 Low
- 🔵 Log
Each category shows a badge with the number of matching issues.
2. Search & Sort
At the top, use the search bar to filter by:
- Issue name
- Severity
- Status
- Date
You can also click on column headers (e.g., Score, QoD, Observed At) to sort the list.
3. Issue Table
Each row includes:
- Summary: Name of the vulnerability (clickable to view details)
- Status: Open or Closed
- Severity: From Log to Critical
- Score: Often based on CVSS (0–10 scale)
- QoD: Quality of Detection (how confident the system is)
- Observed At: When the issue was detected
Updated on: 08/08/2025
Thank you!