Filter vulnerabilities list
Vulnerabilities list can be filtered to reduce clutter and see specific vulnerabilities. Filtering the vulnerabilities list can help analyze critical vulnerabilities, vulnerabilities of a particular category, or vulnerabilities seen in specific APIs.
Vulnerabilities list can be filtered from the Vulnerabilities Summary widgets and using the Advanced filters located above the Vulnerabilities List view.
Filtering the vulnerabilities list using a Summary widget sets the Advanced filter to the criteria for the legend or data you click on the widget. Using the Advanced filters on top of the filtering criteria set by the widget filters the vulnerabilities list further. For example, clicking POST /rest/user/login in the APIs with high Vulnerabilities widget, and setting the Advanced filter to Category = Passive Scan, filters the list to show critical vulnerabilities that can be exploited using passive scanning techniques. |
Advanced filters
Advanced filters can be used to filter vulnerabilities by severity, category, fix status, and other criteria. The list can be filtered solely using Advanced filters.
Click the Filter icon at the top-right corner of the vulnerabilties listing to open the filters menu.
Filter | Filtering action |
---|---|
Endpoint | Vulnerabilities seen in APIs with the selected endpoint URLs. For example, GET /rest/user/change-password or GET /rest/admin/application-configuration. Select endpoint URLs or search for URLs by text strings. Use Precise Match if required. |
Method | Vulnerabilities seen in APIs that use the selected call methods ( DELETE, GET, OPTIONS, POST, PUT, and TRACE) |
Severity | Vulnerabilities of the selected severity levels ( Critical, Major, Minor, and Info) |
Event ID |
Vulnerabilities with the selected event IDs |
Category | Vulnerabilities in the selected categories |
Sub Category |
Vulnerabilities in the selected subcategories |
Summary | Vulnerabilities of the selected types |
Status | Vulnerabilities in the selected statuses ( Open, In Progress, and Resolved) |
Resolution | Vulnerabilities in the selected resolution statuses ( New, Fixed, False Positive, and Inconclusive) |
From | Vulnerabilities seen in APIs with this date as the start date of the discovery period |
To | Vulnerabilities seen in APIs with this date as the end date of the discovery period |
Show Aggregation mode
By default, the Show Aggregation switch is set to ON, and the vulnerabilities list is aggregated—a vulnerability seen in multiple APIs is listed only once with the count of APIs in which it is found in the Severity column.
With the apt vulnerability filters set, set the Show Aggregation switch to OFF to see all vulnerability-affected API entries in the list. The options to change the vulnerability's fix status (Status) and resolution status (Resolution) are unavailable.
Precise Match
Precise Match is a switch to filter the text string columns of the vulnerabilities list by the exact match of the text you enter to filter the list.
By default, the Precise Match switch is set to ON.
Show Resolved Events filter
Set the Show Resolved Events filter to ON to see only vulnerabilities that have been fixed (Status = Resolved).
Download filtered list
You can download the filtered list of vulnerabilities as a CSV file for offline analysis. Without filters applied, all vulnerabilities are listed in the file.
- Click Download above the vulnerabilities list.