Vulnerabilities inventory

View as Markdown

When viewing vulnerability groups, you can use the keywords in this section to search and filter.

Name

The name field can be searched using the syntax name:<term>.

name:"Cisco IOS Software DHCP Remote Code Execution Vulnerability"
name:"PHP < 5.3.12 / 5.4.2 CGI Query String Code Execution"

CVE

The CVE field can be searched using the syntax cve:<term>.

cve:CVE-2021-44228
cve:CVE-2016-2183

KEV

Membership in a Known Exploited Vulnerability (KEV) list can be searched using the syntax kev:<term>.

kev:t

will search for vulnerabilities that appear on a KEV list.

Specific KEV lists can be searched by name.

Severity

The severity field can be searched using the syntax severity:<term>.

severity:info
severity:medium

Risk

The Risk and Risk Score fields can be searched using either numeric or keyword values. Risk score is an integer from zero through four, where 0 is Info level risk and 4 indicates Critical risk.

risk:"Critical"
risk:2

Vulnerability instance count

The Asset count field can be searched using the syntax count:<text>.

count:>0

Site name or ID

Use the syntax site:<term> to filter by site name or ID.

site:Primary

EPSS score

The EPSS score can be searched using the syntax epss_score:<term>. The term supports numerical comparison operators (>, >=, <, <=, =).

epss_score:>0.5
epss_score:<=0.1
epss_score:=0.9

Timestamps

Use the following syntaxes to search the vulnerability group timestamp fields (created_at, suppressed_at):

  • created_at:<term>
  • suppressed_at:<term>

The term supports the standard runZero [time comparison syntax][time].

created_at:>2weeks
created_at:<30minutes
suppressed_at:<1day

Suppression

The current suppressed or unsuppressed state of vulnerability groups can be searched using the syntax suppressed:<term>.

suppressed:t

will search for vulnerability groups that are suppressed. Inversely,

suppressed:f

will search for vulnerability groups that are not suppressed.

A special value of any can be used to display all records, regardless of suppression settings:

suppressed:any

will display both suppressed and unsuppressed vulnerability groups.

Additionally, the user who performed the suppression can be found using the following syntaxes:

suppressed_by:<username>
Updated