Skip to main content

Getting the Results

Each scan generates a report containing identified vulnerabilities categorized by severity levels:

  • High
  • Medium
  • Low (Which also includes informational findings)

Source of Vulnerabilities

Most vulnerabilities are derived from the National Vulnerability Database (NVD), ensuring up-to-date and accurate security information.

Viewing and Managing Vulnerabilities

You can review the detected vulnerabilities and manage them through the Results → Vulnerabilities menu. On this page, you have the ability to:

  • Filter vulnerabilities by severity leve, date range, and more.
  • View details of each vulnerability, including:
    • Host and port where it was identified
    • Summary and impact
    • Affected software versions
    • Proposed solutions including our [AI-powered remediation advice]
    • Additional metadata, such as:
      • CVE ID
      • CVSS score
      • CWE ID
      • Reference links

Exceptions

You can add exceptions to vulnerabilities where necessary. For more details on exceptions, including how to add them, refer to Adding Vulnerability Exceptions.