Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 42 Next »

Overview

The Security Alerts: View By Vulnerability screen enables you to manage the alerts per vulnerability according to the selected products/projects.  For example, use this screen to ignore alerts of a specific vulnerability across all libraries in the selected scope.

In addition, this provides the ability to triage such vulnerability alerts with better granularity - per vulnerability instead of per library.

Accessing the Security Alerts: View By Vulnerability Screen

To access the Security Alerts: View By Vulnerability screen, do as follows:

  • From the menu bar, select Alerts > Security Alerts - View By Vulnerability. The Security Alerts - View By Vulnerability screen is displayed. 

Selecting and Generating the Report Data

  1. Filter the alert by the following parameters: 
    • Time - Filters for the time scope
    • Products - Filters for the relevant product
    • Projects - Filters for the relevant project
    • Vulnerability ID - Filters for the relevant ID
    • Status - Filters for active, ignored or resolved (resolved alerts are those that include statuses Ignored, Library Removed, Library In-House, and Library Whitelist) alerts
      When hovering over the status column, in case the alert's status has been manually changed by a user, the users email and the comment that they provided will appear as a tool tip. 
  2. For additional (hidden) filters, expand Filter. Options are as follows:
    • By Library - Filters according to library, library type, severity, or source file
    • Value - Filters according to an entered value related to the selection in the By Library filter
  3. Click Apply to set the filters. The list is generated.

NOTE: For the total number of CVE occurrences generated in this alert at a quick glance, refer to the counter () next to the heading.

Refer to the informative table below.

Table Components

ColumnDescription
Vulnerability IDThe vulnerability and its individual ID
LibraryLibrary name where the vulnerability was found
Source FileFile where the vulnerability was found
ProductThe product where the vulnerability was found
ProjectThe project where the vulnerability was found
SeverityHigh, medium, low 
DetailsThe library’s vulnerabilities list. For customers using Prioritize, this screen displays the traces for the effective vulnerabilities.
CVSSThe vulnerability's Common Vulnerability Scoring System (CVSS) score 
CVSS TypeCVSS 1, CVSS 2, etc. Refer here for more information.
Status

Alerting status of the vulnerability:

  • Active- The application will notify users about the alert and list it by default in the dashboard
  • Ignored - The application will not notify users about the alert and will not list it by default under the dashboard
  • Resolved - Alerts in statuses Ignored, Library Removed, Library In-House, and Library Whitelist and therefore the application will not notify users about the alert

All data can be filtered and sorted. 

Library TypeJava, source library, etc
Creation Date

The date when the alert was created

Modified Date

The date when the alert was last modified

Top FixThe best fix that matches the vulnerability
ActionsChange alert status (for example, change the status from ignored to active by selecting the “activate” action)
ExportExport the table data to MS Excel, XML, or JSON

Additional Actions

  • To ignore an alert, check the alert's row (checkbox on the left) and select Action > Ignore
  • To activate an ignored alert, filter the table for ignored alerts, then check the alert's row (checkbox on the left) and select Action > Activate. The alert will no longer appear in the ignored alerts list and will appear instead in the list of active alerts.

IMPORTANT

The actions of ignoring and activating alerts are saved to the Change Log History Report. This report can be used to filter and monitor these actions, and to view who performed them and when, and to view any informative comments that those users might have added.

  • To export an alert to a selected format (Excel, XML or JSON), check the alert's row (checkbox on the left), select Action > Export, and select your desired format.

Viewing Vulnerabilities' Details

  • To view information for a specific vulnerability, in Vulnerability ID, select the vulnerability. The Security Vulnerability page displays relevant information regarding the vulnerability such as ID, description and score, CVSS3 base score metrics, libraries that are vulnerable due to this specific vulnerability and suggested fixes.
  • To view information for a specific vulnerability's library, in the Library column, click the library. The Library Details page displays Impact Analysis (in which projects those libraries are used and whether they are direct or transitive dependencies), general library details, license and copyright information, information on additional known versions of the library, a list of all of the libraries' vulnerabilities, library trends, etc.
  • To view information for a specific vulnerability's related product or project, in the Product or Project columns, click the product or project. The relevant Home screen for that product or project is displayed with a variety of dashboard options, including security alerts, license analysis and vulnerability analysis.
  • No labels