Skip to content

Vulnerability Search and Filters

In the Vulnerabilities section, Wallarm provides convenient methods for searching among detected vulnerabilities.

You can use:

  • Filters to select filtering criteria

  • Search field to input search queries with attributes and modifiers similar to human language

The values set in the filters are automatically duplicated in the search field, and vice versa.

Filters

Available filters are presented in Wallarm Console on the filters panel that is expanded and collapsed using the Filter button.

Vulnerability filters in the UI

When values of different filters are selected, the results will meet all those conditions. When different values for the same filter are specified, the results will meet any of those conditions.

Search field

The search field accepts queries with attributes and modifiers similar to human language which makes submitting queries intuitive. For example:

  • rce high: to search for all RCE vulnerabilities with high risk level

  • ptrav medium: to search for all path traversal vulnerabilities with high risk level

When values of different parameters are specified, the results will meet all those conditions. When different values for the same parameter are specified, the results will meet any of those conditions.

Setting the attribute value to NOT

To negate the attribute value, please use ! before the attribute or modifier name. For example: rce !low to show all RCE vulnerabilities except the ones with the low risk level.

Below you will find the list of attributes and modifiers available for use in search queries.

Search by vulnerability type

Specify in the search string:

A vulnerability name can be specified in both uppercase and lowercase letters: SQLI, sqli, and SQLi are equally correct.

Search by risk level

Specify the risk level in the search string:

  • low: low risk level.

  • medium: medium risk level.

  • high: high risk level.