Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

 

Vulnerabilities provide a detailed view of all the application’s vulnerabilities, allowing to:

  • Search vulnerabilities according to multiple search criteria
  • Order and group vulnerabilities by different characteristics
  • Inspect details of every single vulnerabilities
  • Access to vulnerability description and remediation tips

 

Image Modified

Summary data

...

  • By Vulnerability Type: number of vulnerabilities for every type (please see see Vulnerability Types )
  • By Language: number of vulnerabilities found for every programming language
  • By Priority: number of vulnerabilities found by priority (according to security rules priorities as defined in the model used for the analysis)

...

  • Files: Number of files that are not conformant to the selected security rule
  • Defects: Number of vulnerabilities found for the selected security rule
  • Rule: Name (desc) of the security rule
  • Priority of the rule (from Low to Very High)
  • CWE weakness reference(s) mapping for the selected security rule
  • Characteristic : main software analytics categorization of the selected rule
  • Vulnerability Type:  security topic addressed by the selected security rule
  • Programming Language
  • Effort to invest to fix all the vulnerabilities of the selected security rule

 

 

Image Modified

 

Clicking on a vulnerability row will let you drill down to detail on security rule (from general description to the specific line of the vulnerability in a source file).

For further info, please visit Understanding Data-Flow Vulnerabilties