Skip to content

Checking Vulnerabilities

In the Vulnerabilities section of Wallarm Console, you can check vulnerabilities detected by Wallarm in your applications.

By default, all vulnerabilities are divided into groups by the risk level. Lists inside the groups are sorted by the vulnerability discovery date.

Vulnerabilities tab

Wallarm stores the history of all discovered vulnerabilities and checks them regularly — both the open and closed ones. If a closed vulnerability opens as a result of checking, you will receive a corresponding notification.

Clicking a vulnerability displays its change log.

Sort the Vulnerabilities by Risk or Date

You can sort the vulnerabilities by the following criteria:

  • Risk:

    • High first
    • Low first
  • Date

    • From latest
    • From earliest

You can filter the vulnerabilities by the risk level by pressing one of the following buttons:

  • All — display the vulnerabilities from all of the risk level groups

  • High risk — display the high risk vulnerabilities

  • Medium risk — display the medium risk vulnerabilities

  • Low risk — display the low risk vulnerabilities

Filter the Active and Closed Vulnerabilities

Click Active to see the active vulnerabilities.

Click closed to see the closed vulnerabilities.

Tabs to filter vulnerabilities

You can filter the closed vulnerabilities by clicking the following selectors:

  • all: The list of closed and false vulnerabilities.

  • fixed: The list fixed vulnerabilities only.

  • false: The list of false vulnerabilities only.