Vulnerabilities
Overview
Architecture
SBOM Upload
└── Component Extraction
└── Identifier Matching (PURL / CPE)
└── Vulnerability Database Lookup
├── NVD (National Vulnerability Database)
├── GitHub Security Advisories
├── OSV (Open Source Vulnerabilities)
└── Ecosystem-specific databases
└── Affected Version Range Check
└── Vulnerability Record
├── CVSS Score + Vector
├── EPSS Score + Percentile
├── KEV Status
├── CWE Classification
├── VEX Status + Justification
└── Custom FieldsViewing Vulnerabilities
Product-Level View
Column
Description
Organization-Level View
Severity and Scoring
CVSS (Common Vulnerability Scoring System)
Severity
Score Range
EPSS (Exploit Prediction Scoring System)
EPSS Range
Interpretation
KEV (Known Exploited Vulnerabilities)
CWE (Common Weakness Enumeration)
Custom Scoring Adjustments
VEX Status (Vulnerability Disposition)
Status Values
Status
Description
When to Use
Not Affected Justifications
Justification
Description
Managing Vulnerability Status
Setting Status for a Single Vulnerability
Importing Status from Previous Versions
Setting Status Across Multiple Versions
Setting Status Across Multiple Products
Custom Vulnerabilities
Querying Vulnerabilities
Via CLI
Parameter
Required
Default
Description
Via API
Via MCP
Issue Tracker Integration
Jira Integration
Linear Integration
Downloading Vulnerability Data
Permission Matrix
Permission
Admin
Operator
Viewer
Security Warnings
Common Misconfigurations
Issue
Symptom
Fix
Recommended Best Practices
Last updated