Filter vulnerabilities list

Vulnerabilities list can be filtered to reduce clutter and see specific vulnerabilities. Filtering the vulnerabilities list can help analyze critical vulnerabilities, vulnerabilities of a particular category, or vulnerabilities seen in specific APIs.

Vulnerabilities list can be filtered from the Vulnerabilities Summary widgets and using the Advanced filters located above the Vulnerabilities List view.


Filtering the vulnerabilities list using a Summary widget sets the Advanced filter to the criteria for the legend or data you click on the widget.

Using the Advanced filters on top of the filtering criteria set by the widget filters the vulnerabilities list further.

For example, clicking POST /rest/user/login in the APIs with high Vulnerabilities widget, and setting the Advanced filter to Category = Passive Scan, filters the list to show critical vulnerabilities that can be exploited using passive scanning techniques.


Advanced filters

Advanced filters can be used to filter vulnerabilities by severity, category, fix status, and other criteria. The list can be filtered solely using Advanced filters.

Click the Filter icon at the top-right corner of the vulnerabilties listing to open the filters menu.

Filter Filtering action
Endpoint Vulnerabilities seen in APIs with the selected endpoint URLs. For example, GET /rest/user/change-password or GET /rest/admin/application-configuration.
Select endpoint URLs or search for URLs by text strings. Use Precise Match if required.
Method Vulnerabilities seen in APIs that use the selected call methods ( DELETE, GET, OPTIONS, POST, PUT, and TRACE)
Severity Vulnerabilities of the selected severity levels ( Critical, Major, Minor, and Info)   
Event ID
Vulnerabilities with the selected event IDs
Category Vulnerabilities in the selected categories
Sub Category
Vulnerabilities in the selected subcategories
Summary Vulnerabilities of the selected types
Status Vulnerabilities in the selected statuses ( Open, In Progress, and Resolved)
Resolution Vulnerabilities in the selected resolution statuses ( New, Fixed, False Positive, and Inconclusive)
From Vulnerabilities seen in APIs with this date as the start date of the discovery period
To Vulnerabilities seen in APIs with this date as the end date of the discovery period

Show Aggregation mode

By default, the Show Aggregation switch is set to ON, and the vulnerabilities list is aggregated—a vulnerability seen in multiple APIs is listed only once with the count of APIs in which it is found in the Severity column.

With the apt vulnerability filters set, set the Show Aggregation switch to OFF to see all vulnerability-affected API entries in the list. The options to change the vulnerability's fix status (Status) and resolution status (Resolution) are unavailable.


Precise Match

Precise Match is a switch to filter the text string columns of the vulnerabilities list by the exact match of the text you enter to filter the list.

By default, the Precise Match switch is set to ON.


Show Resolved Events filter

Set the Show Resolved Events filter to ON to see only vulnerabilities that have been fixed (Status = Resolved).


Download filtered list

You can download the filtered list of vulnerabilities as a CSV file for offline analysis. Without filters applied, all vulnerabilities are listed in the file.

  • Click Download above the vulnerabilities list.