Skip to content

Vulnerability Management

The Vulnerabilities section of the Operations module provides comprehensive vulnerability tracking with severity classification, CVSS scoring, validation workflows, and integration with report findings.

🖥️ Vulnerability Management Interface Screenshot

Full create, read, update, and delete operations are supported:

  • Create: Add vulnerabilities manually or through imports
  • Read: View vulnerabilities in table format or floating windows
  • Update: Modify vulnerability details, status, and validation data
  • Delete: Remove vulnerabilities with confirmation, supports bulk deletion

Each vulnerability record contains the following fields:

FieldTypeDescription
titleStringVulnerability name/title
severitySelectSeverity level: critical, high, medium, low, info
cve_idStringCVE identifier (e.g., CVE-2024-1234)
cwe_idStringCWE identifier (e.g., CWE-89)
cvss_scoreNumberCVSS score (0.0 to 10.0)
cvss_vectorStringCVSS vector string
descriptionTextDetailed vulnerability description
statusSelectCurrent status in the workflow
sourceStringImport source tool name
source_idStringUnique ID from source tool
serviceStringAffected service/application
componentRelationProject component reference
metadataJSONAdditional structured data

Vulnerabilities are classified by severity with color-coded badges:

SeverityCVSS RangeColorDescription
Critical9.0 - 10.0RedImmediate exploitation risk, critical business impact
High7.0 - 8.9OrangeSignificant risk requiring urgent attention
Medium4.0 - 6.9YellowModerate risk, should be addressed in normal cycle
Low0.1 - 3.9BlueMinor risk, address as resources allow
Info0.0GrayInformational finding, no direct security impact

Vulnerabilities progress through defined status states:

open → confirmed → remediated
false_positive
accepted
StatusDescription
openInitial state, vulnerability identified but not reviewed
confirmedValidated as a genuine security issue
remediatedFixed by the target organization
false_positiveDetermined to be incorrectly identified
acceptedRisk accepted by stakeholders
🖥️ Vulnerability Filtering Options Screenshot

The vulnerability list supports comprehensive filtering:

  • Service: Filter by affected service or application
  • Severity: Filter by one or more severity levels
  • Status: Filter by current workflow status
  • Source: Filter by import source tool
  • Validation: Filter by manually validated or not validated
  • Component: Filter by project component
  • Text Search: Search across titles and descriptions

Sort the vulnerability list by:

  • Severity (critical first by default)
  • Status
  • Created date
  • CVSS score
  • Title
🖥️ Floating Window Editor for Vulnerabilities Screenshot

Vulnerabilities can be viewed and edited in floating windows:

  • Open multiple vulnerabilities in separate windows
  • Minimize windows to a taskbar
  • View affected assets within the editor
  • Edit all fields including validation data
🖥️ Manual Validation Workflow Interface Screenshot

The validation workflow allows analysts to document verification of vulnerabilities:

  1. Select vulnerabilities to validate (single or bulk)
  2. Add validation notes explaining the verification process
  3. Attach evidence documenting the validation
  4. Mark as validated to record the validation
FieldTypeDescription
manually_validatedBooleanWhether the vulnerability has been validated
validated_byRelationUser who performed validation
validation_dateDateWhen validation occurred
validation_notesTextNotes explaining the validation
validation_evidenceTextEvidence supporting the validation

Validated vulnerabilities display a visual badge indicating:

  • Validation status (validated/not validated)
  • Validator name
  • Validation date

Validate multiple vulnerabilities at once:

  1. Select vulnerabilities using checkboxes
  2. Click the bulk validate action
  3. Enter shared validation notes
  4. All selected vulnerabilities are marked as validated
🖥️ Bulk Operations Interface Screenshot

Update multiple vulnerabilities simultaneously:

  • Status Update: Change the status of all selected vulnerabilities
  • Service Update: Assign a common service to selected items
  • Component Assignment: Assign vulnerabilities to a component

The selection system provides:

  • Individual checkbox selection
  • Select all visible items
  • Select none (clear selection)
  • Selection count indicator

Delete multiple vulnerabilities with:

  • Confirmation dialog showing count
  • Warning for validated vulnerabilities
  • Cascading deletion of related mappings

The dashboard displays vulnerability counts by severity:

MetricDescription
CriticalCount of critical severity vulnerabilities
HighCount of high severity vulnerabilities
MediumCount of medium severity vulnerabilities
LowCount of low severity vulnerabilities
InfoCount of informational findings

Track vulnerability progress through the workflow:

MetricDescription
OpenVulnerabilities awaiting review
ConfirmedValidated vulnerabilities
False PositiveIncorrectly identified items
RemediatedFixed vulnerabilities
AcceptedRisk-accepted vulnerabilities

Filter statistics by selected project components to see:

  • Component-specific severity breakdown
  • Validation progress per component
  • Status distribution per component
🖥️ Asset Relationships from Vulnerability View Screenshot

Each vulnerability displays its affected assets:

  • Asset name and value
  • Asset type indicator
  • Link to the full asset record

The vulnerability list shows an asset count badge indicating how many assets are affected by each vulnerability.

For network vulnerabilities, the relationship includes:

  • Port number
  • Protocol (TCP/UDP)
  • Service name
  • Additional network details

Vulnerabilities that have been mapped to report findings display:

  • Mapping indicator badge
  • Link to the associated finding
  • Finding title preview

The system can automatically map vulnerabilities to findings based on:

  • CVE ID matching
  • CWE ID matching
  • Title similarity matching

Analysts can manually map vulnerabilities to findings:

  1. Select the vulnerability
  2. Choose the target finding from the report
  3. Confirm the mapping

Imported vulnerabilities are deduplicated using:

  • Primary Match: source_id + source + project
  • Secondary Match: cve_id + project (if source_id not available)

When a matching vulnerability exists:

  • Identical: Record is skipped
  • Changed: Record is updated with new data
  • New fields: Additional data is merged

When importing, the system automatically:

  • Creates asset-vulnerability mappings based on affected_assets
  • Links to existing assets by matching asset values
  • Creates new assets if referenced assets don’t exist
  1. Review by severity - Start with critical and high severity items
  2. Document evidence - Include screenshots, request/response data
  3. Note false positives - Explain why items are false positives for future reference
  4. Bulk validate similar items - Group related vulnerabilities for efficient validation
  • Set confirmed status after successful validation
  • Use false_positive sparingly and with documentation
  • Mark remediated only after confirming the fix
  • Use accepted status for business-approved risks
  • Map validated vulnerabilities to corresponding report findings
  • Group related vulnerabilities under a single finding
  • Use auto-mapping for standard CVE-based findings
  • Review auto-mappings for accuracy