Overview

The Security Alerts: View By Vulnerability screen enables you to manage the alerts per vulnerability according to the selected products/projects.  For example, use this screen to ignore alerts of a specific vulnerability across all libraries in the selected scope.

In addition, this provides the ability to triage such vulnerability alerts with better granularity - per vulnerability instead of per library.

Accessing the Security Alerts: View By Vulnerability Screen

To access the Security Alerts: View By Vulnerability screen, do as follows:

Selecting and Generating the Report Data

  1. Filter the alert by the following parameters: 
  2. For additional (hidden) filters, expand Filter. Options are as follows:
  3. Click Apply to set the filters. The list is generated.

NOTE: For the total number of CVE occurrences generated in this alert at a quick glance, refer to the counter () next to the heading.

Refer to the informative table below.

Table Components

ColumnDescription
Vulnerability IDThe vulnerability and its individual ID
LibraryLibrary name where the vulnerability was found
Source FileFile where the vulnerability was found
ProductThe product where the vulnerability was found
ProjectThe project where the vulnerability was found
SeverityHigh, medium, low 
DetailsThe library’s vulnerabilities list. For customers using Prioritize, this screen displays the traces for the effective vulnerabilities.
CVSSThe vulnerability's Common Vulnerability Scoring System (CVSS) score 
CVSS TypeCVSS 1, CVSS 2, etc. Refer here for more information.
Status

Alerting status of the vulnerability:

  • Active- The application will notify users about the alert and list it by default in the dashboard
  • Ignored - The application will not notify users about the alert and will not list it by default under the dashboard
  • Resolved - Alerts in statuses Ignored, Library Removed, Library In-House, and Library Whitelist and therefore the application will not notify users about the alert

All data can be filtered and sorted. 

Library TypeJava, source library, etc
Creation Date

The date when the alert was created

Modified Date

The date when the alert was last modified

Top FixThe best fix that matches the vulnerability
ActionsChange alert status (for example, change the status from ignored to active by selecting the “activate” action)
ExportExport the table data to MS Excel, XML, or JSON

Additional Actions

The actions of ignoring and activating alerts are saved to the Change Log History Report. This report can be used to filter and monitor these actions, and to view who performed them and when, and to view any informative comments that those users might have added.

Viewing Vulnerabilities' Details