Skip to main content
The Vulnerabilities module is the central hub for managing all security findings discovered during assessments. It provides complete lifecycle management from discovery through remediation, with detailed analytics and reporting capabilities.

Overview Dashboard

The vulnerability overview provides immediate visibility into your security posture with critical alerts and severity distribution.

Critical Alert System

When critical vulnerabilities are detected, the platform displays prominent alerts requiring immediate attention:
  • Critical findings flag with warning indicators
  • Action status: “Immediate action required” notifications
  • Priority queue for critical remediation

Severity Distribution

All vulnerabilities are categorized by severity level:
SeverityDescriptionTypical CVSS Range
CriticalImmediate exploitation risk, severe business impact9.0 - 10.0
HighSignificant risk requiring prompt remediation7.0 - 8.9
MediumModerate risk, should be addressed in normal cycle4.0 - 6.9
LowMinor issues with limited impact0.1 - 3.9

Vulnerability Type Breakdown

Findings are classified by attack vector:

Web Vulnerabilities

Application-layer security issues including injection flaws, authentication bypasses, and misconfigurations

Network Vulnerabilities

Infrastructure-level issues including exposed services, protocol weaknesses, and network misconfigurations

Personnel/Social

Human-factor vulnerabilities including phishing susceptibility and access control issues

Vulnerability Table

The main vulnerability table displays all findings with comprehensive filtering and search capabilities.

Table Columns

ColumnDescription
IDUnique vulnerability identifier (e.g., 687130b6)
NameVulnerability title with detailed description
StatusCurrent state: Opened, Mitigated, or Closed
Attack VectorClassification: Web, Network, or Person
CVSS ScoreNumerical severity rating (0-10 scale)
SeverityCategorical level: Critical, High, Medium, Low
PriorityOperational priority for remediation
ComplexityEstimated remediation difficulty
Discovery DateWhen the vulnerability was identified
Related AssetAssociated asset, service, or endpoint

Common Vulnerability Types

  • OAuth2 Token Exposure (CVSS 8.8)
  • Privilege Escalation via Admin Access (CVSS 7.8)
  • Missing rate limiting on authentication endpoints
  • SSRF in File Processor (CVSS 7.5)
  • SQL Injection vulnerabilities
  • Command injection flaws
  • Kafka Unauthenticated Access (CVSS 9.1)
  • Redis Unprotected Instance (CVSS 8.3)
  • Unencrypted Telnet Service (CVSS 7.5)
  • Exposed .git/ directories
  • Accessible .env files
  • Database file exposure
  • Configuration file leakage

Search & Filtering

  • Full-text search across all vulnerability fields
  • Advanced filters for severity, status, vector, date range
  • Pagination with configurable rows per page
  • Bulk selection for batch operations

Vulnerability Detail View

Clicking on any vulnerability opens a comprehensive detail view with three tabs.

Overview Tab

Classification Section
  • Attack vector type with visual icon (Web/Network/Person)
  • Severity badge with color coding
  • CVSS Score prominently displayed
Summary Metrics
  • Linked asset (port, service, or endpoint)
  • Current status with visual indicator
  • Priority level assignment
  • Complexity assessment
  • Discovery date
Action Buttons
  • Edit: Modify vulnerability details
  • Delete: Remove vulnerability record

Affected Components

Lists all systems and components impacted by the vulnerability:
Example: OAuth2 Token Exposure
- OAuth Service
- API Gateway
Total: 2 components affected

Description & Reproduction Steps

Detailed vulnerability information including:
  1. Technical description of the vulnerability
  2. Step-by-step reproduction guide:
    • Authenticate with valid credentials
    • Make API request to vulnerable endpoint
    • Observe the security issue in response

Attack Vector Map

Visual network graph showing the exploitation path:
  • Nodes: Assets involved in the attack chain
  • Edges: Relationships and connections
  • Interactive: Click nodes to explore asset details
Example path: 443 (service) → Apache Kafka Cluster → 10.0.0.1 (target)

Remediation Section

Priority and Complexity Indicators
  • Priority: Critical / High / Medium / Low
  • Complexity: Low / Medium / High
Remediation Steps Structured guidance for fixing the vulnerability:
1

Immediate Mitigation

Apply temporary controls to reduce risk
2

Root Cause Fix

Implement the permanent solution
3

Verification

Confirm the fix and update status

Vulnerability Management Workflow

Discovery Phase

Automated Scanning

Continuous vulnerability detection via agents

Manual Import

Import findings from external tools and data sources

Penetration Testing

Results from manual security assessments

Threat Intelligence

Integration with threat intelligence feeds

Analysis Phase

  • CVSS scoring assignment based on impact and exploitability
  • Severity classification using industry standards
  • Attack vector categorization (Web, Network, Person)
  • Asset correlation linking findings to infrastructure
  • Impact assessment evaluating business risk

Tracking Phase

StatusDescription
OpenedNewly discovered, awaiting remediation
In ProgressActively being remediated
MitigatedTemporary controls applied
ClosedPermanently resolved and verified

Timeline Analytics

The vulnerability timeline visualization shows:
  • Historical discovery patterns over time
  • Severity breakdown by date for trend analysis
  • Peak periods when most vulnerabilities were found
  • Date picker for custom temporal range selection

Best Practices

Prioritization StrategyFocus remediation efforts based on:
  1. Severity - Critical and High first
  2. Exploitability - Easily exploitable vulnerabilities take priority
  3. Asset criticality - Vulnerabilities on business-critical systems
  4. Complexity - Quick wins (low complexity) can reduce overall risk rapidly
Critical VulnerabilitiesAny vulnerability marked as Critical should be addressed within 24-48 hours. These represent immediate exploitation risk with severe business impact.

Integration with Other Modules

The Vulnerabilities module connects seamlessly with other platform components:
  • Scope & Recon: Vulnerabilities link to discovered assets
  • Agents: Automated scanning populates findings
  • Reporting: Findings flow into assessment reports
  • AI Assistant: Get remediation recommendations and analysis