Skip to main content

Vulnerabilities Dashboard

In the Vulnerabilities dashboard in the Analytics module, users can access informative charts that provide insights into the security vulnerabilities detected within their data.

The Vulnerability KPIs also offer actionable insights. With one click, users can access vulnerability details directly. This feature speeds up remediation, reduces exposure, and bridges the gap between AppSec and development teams.

In-Depth Vulnerability Analysis

Hovering over a segment in each chart in the Vulnerabilities dashboard displays a Show on table link.

show-on-table.png

Clicking this link opens a pane with a list of all detected vulnerabilities in that segment, sorted by date in ascending order, with the oldest vulnerability at the top.

open-vulnerabilities.png

Vulnerabilities can be further filtered by parameters specific to the KPI selected in the KPI selector (1). For example, if the KPI selector is set to By Severity, the Severity filters will appear (2). If the KPI selector is set to By Status, the filters field will change to Statuses, etc.

Detailed Information for Each Vulnerability

Each entry in the vulnerability list includes:

  • Vulnerabilities: Name and count of individual vulnerabilities

  • Project: Name of the associated project

  • State: Current state.

  • Status: Current status

  • Scanner: Name of the scanner that detected the vulnerability.

  • Aging: Time elapsed since the first detection

  • Detected First & Last: Dates of the first and last detections for traceability.

Direct Access to In-Depth Analysis

When hovering over a vulnerability, two options are displayed: Results (3) and Copy link (4).

Clicking Results opens the vulnerability in a new browser tab, allowing immediate remediation.

Copy link copies a link to the vulnerability to the clipboard, making it easy to share with a developer for prompt action.

Vulnerabilities Over Time

In the Over Time view type, the following vulnerability-related charts are available:

Vulnerabilities by Severity

This chart categorizes vulnerabilities based on their severity levels: Info, Low, Medium, and High. Each severity level represents a specific vulnerability's potential impact and risk. This chart allows users to understand the distribution of vulnerabilities across different severity levels within their applications.

For example, it can highlight the prevalence of low-severity issues, which may not pose an immediate threat but should still be addressed, as well as high-severity vulnerabilities that demand urgent attention. This information is essential for prioritizing and addressing security weaknesses.

Vulnerabilities by State

This chart classifies vulnerabilities into various states, such as To Verify, Not Exploitable, Urgent, and Confirmed. These states represent the current status or progress of addressing vulnerabilities. To Verify vulnerabilities may require further investigation, while Urgent ones demand immediate remediation.

This chart offers a dynamic view of the vulnerability management process, allowing users to track vulnerabilities' lifecycles from their initial discovery to resolution.

Organizations can prioritize remediation efforts and allocate resources effectively by understanding the severity and status of vulnerabilities. This data-driven approach ensures a proactive and adaptive response to security threats and helps safeguard applications from potential risks.

Vulnerabilities Totals

In the Totals view mode, the available charts are as follows:

Mean Time to Resolution by Severity (SAST)

This chart provides valuable information from the SAST scanner on the number of vulnerabilities resolved for each severity level and the average time it took to resolve them (measured in days). It helps assess the efficiency and effectiveness of the vulnerability resolution process and focuses only on resolved vulnerabilities.

Vulnerabilities by Severity

This pie chart displays the total results organized by severity levels, their percentage of the total results, and their density for each severity level.

When hovering over a specific severity segment on the pie chart, the information for that severity level is highlighted, making it easier to understand the distribution of vulnerabilities based on their severity levels.

Vulnerabilities by State

This chart displays the results grouped by the State, including custom result states. By hovering over each state, you can view the details for the total number of findings, their percentages, and their density.

Vulnerabilities by Status

This pie chart displays the results grouped by status, representing the total findings and their percentage for each status.

Please note that the data used in the calculation is based on the latest scans and open results. Therefore, resolved results are unavailable as part of this KPI and are no longer included in the current findings.

When hovering over a specific status segment on the pie chart, the information for that status is highlighted.

Vulnerabilities by Severity and State

This table displays the total number of results grouped by their result state, including custom result states. Each state is further organized by severity.

The table provides a comprehensive overview of the distribution of vulnerabilities based on their result states and severity levels, enabling effective analysis and monitoring of security-related outcomes.

Top 20 Oldest Vulnerabilities

This card presents the 20 oldest vulnerabilities of all projects, regardless of language. For each vulnerability, you can view its age, measured in days.

Top 20 Vulnerabilities

This card presents the 20 riskiest vulnerabilities found in scans, ordered by severity, from high to informational, regardless of the language.