See where vulnerabilities are and more details

Last updated: Mar 25, 2026


See a vulnerability summary

The Vulnerabilities section is the first one you see when accessing a group. It presents you first with a summary of what has been detected in the group in terms of the quantity of vulnerabilities and the risk exposure they represent. The latter refers to the extent to which the system is vulnerable to successful cyberattacks as measured by Fluid Attacks' CVSSF metric.

See vulnerability summary on the Fluid Attacks platform

The summary gives you this information:

  • Weaknesses: The number of categories into which detected security issues most likely fall
    • Open: The number of weaknesses corresponding to vulnerabilities that are present in the system
    • Closed: The number of weaknesses that were reported in the past but are currently not present in the system
  • Vulnerabilities: The number of spots in the system where security issues have been detected
    • Open: The number of vulnerabilities that are present
    • Closed: The number of vulnerabilities that were reported in the past but are currently not present
    • Fix Available: The number of present vulnerabilities that can be fixed with the help of Custom Fix or Autofix or for which a suggested package update is available
  • Risk exposure: The sum of the CVSSF scores of all the vulnerabilities that have not been remediated (beneath is the percentage corresponding to the group's share of risk exposure within the organization)

See the list of vulnerabilities detected

The Vulnerabilities section first provides you with an overview of all the vulnerabilities detected in your software grouped by the weakness they are categorized in.

View reported types of vulnerabilities on the Fluid Attacks platform

Vulnerabilities table

The Vulnerabilities table conveniently groups the vulnerabilities detected in your system by weaknesses and provides general details.

Understand the Vulnerabilities table on the Fluid Attacks platform

The following are short descriptions of what you find for each column:

  • Weakness: The standardized security weakness best matching the characteristics of the vulnerabilities in your system
  • Status: Indicates the condition of this weakness, where it is Open if the weakness is present or Closed if the weakness has been remediated
  • Priority: The percentile, relative to all vulnerabilities identified so far, occupied by the vulnerability with the highest remediation priority score among all those grouped within a given weakness. The priority score calculation depends on (a) your organization's prioritization policies based on the transitivity of the affected dependency, the phase of use of the vulnerable component, whether it is listed in CISA's KEV list, the EPSS, and the estimated time to fix; and (b) a default score calculated using the Common Vulnerability Scoring System (CVSS) as follows: (4^(CVSS-4)) / 4,096.
  • Open vulns: The count of vulnerabilities in your system, related to the weakness, that are still present
  • Severity overview: The number of detected vulnerabilities of each CVSS qualitative severity rating, which groups scores as follows:
    • Low (0.1 - 3.9)
    • Medium (4.0 - 6.9)
    • High (7.0 - 8.9)
    • Critical (9.0 - 10.0)
  • Last reported: Days since the last detection of a vulnerability from the respective weakness category (regardless of the current Status)
  • Age: Days since this weakness was first detected in your system
  • Release date: Date when the weakness was first reported in your system
  • Remediation: Percentage of the related reported vulnerabilities remediated by your team
  • Reattack: Status of reattacks for this weakness ('Pending' if a reattack is due, '-' otherwise)
  • Treatment: The number of vulnerabilities per assigned treatment

You can expand rows using the downward arrow to view some of the information about the weaknesses stacked, along with some additional bits, like if the weakness is exploitable.

Expand weakness on the Fluid Attacks platform

Spot newly reported vulnerabilities

Newly reported weaknesses are highlighted with a New label for seven days in the table, helping you quickly identify them.

Recognize newly reported vulnerabilities on the Fluid Attacks platform

Search the Vulnerabilities table

The search bar in the Vulnerabilities section lets you quickly find specific information within the table by showing only the rows whose content match your search. It is advisable you search by entering the name of the weakness, repository nickname or vulnerability location (e.g., file name).

Search the vulnerabilities table on the Fluid Attacks platform

Filter the Vulnerabilities table

You can filter the table to facilitate your search. To access the multiple options, click the filters button (Filter Icon).

Find filters icon in Vulnerabilities on the Fluid Attacks platform
Show filters
Filter the vulnerabilities table on the Fluid Attacks platform
Select a filter option
Filter vulnerabilities by priority on the Fluid Attacks platform
Select values and apply filter

To clear a filter, click on the X next to it.

Clear filters of the vulnerabilities table on the Fluid Attacks platform

You can also use a selection of quick filters: Origin, Status, and Severity.

Filter vulnerabilities by severity on the Fluid Attacks platform

See top 20 vulnerabilities to prioritize

To identify the vulnerabilities you need to fix most urgently, click on Show top 20 in priority rank.

See vulnerabilities to prioritize on the Fluid Attacks platform

The platform then shows you the 20 vulnerabilities with the highest Priority value within the group. The information shown in the columns is explained further below. You can click on Go to vulnerability to see details of the vulnerability, apply a treatment, get AI-generated remediation guidance, and more.

See top 20 vulnerabilities on the Fluid Attacks platform

To stop seeing the top 20, click on Hide top 20 in priority rank.

Hide and show columns in the Vulnerabilities table

You can customize the table view by choosing which columns to display. Click the columns button (Columns Icon) to open a pop-up window where you can hide or show columns. To quickly find a desired column, you can type its name in this window's search bar. Once you are done customizing, click on Save.

Customize vulnerabilities table on the Fluid Attacks platform

Reorder columns in the Vulnerabilities table

You can further customize the table view by choosing the column order. Click the columns button (Columns Icon) to open a pop-up window where you can drag the column names to rearrange the table. You can click on the X of a corresponding column to hide it. When you are finished, click on Save.

Reorder Vulnerabilities table on the Fluid Attacks platform

Generate reports

The Generate report option in the Vulnerabilities section allows you to download reports varying in detail. Group Managers additionally have the option to generate security testing certificates. For details on available report types and how to generate them, read Download a report of detected vulnerabilities.

Generate reports on the Fluid Attacks platform

See where vulnerabilities are located

In the Vulnerabilities section, when you click on the associated weakness, you then access a set of spaces dedicated to it. The header is visible across the latter, and it informs the group name, the weakness that groups the vulnerabilities, and the amount of time it may take you to remediate one vulnerability.

Understand the vulnerability header on the Fluid Attacks platform

The Vulnerabilities section informs where in your system each vulnerability related to the selected weakness was detected and provides relevant information for its management.

View vulnerabilities locations on the Fluid Attacks platform

These are the descriptions of what you find in the table:

  1. Vulnerability: The found vulnerability, identified by its file path
  • Specific: The exact lines of code, inputs (e.g., password fields) or ports where the vulnerability was found (thus the repetition of files in Location sometimes)
  • Origin: Whether the vulnerability is Inherited (present in third-party code) or Injected (present in code owned by your team).
  • Status: Indicates whether the vulnerability is Open (present) or Closed (no longer present) in the line of code, input or port
  • Severity (v4.0): The Common Vulnerability Scoring System (CVSS) v4.0 score assigned to the vulnerability
  • Priority: The percentile, relative to all vulnerabilities identified so far, occupied by the vulnerability. The priority score calculation depends on (a) your organization's prioritization policies based on the transitivity of the affected dependency, the phase of use of the vulnerable component, whether it is listed in CISA's KEV list, the EPSS, and the estimated time to fix; and (b) the result of (4^(CVSS-4)) / 4,096.
  • Technique: The security testing technique used to detect the vulnerability, which can be one of these:
    • SAST: Automated static code analysis
    • DAST: Automated dynamic analysis
    • SCA: Automated analysis of third-party dependencies
    • SCR: Static code analysis done manually
    • PTaaS: Dynamic analysis done manually
    • RE: Reverse engineering of your system done manually
    • AI SAST: AI-powered static code analysis
    • MAST: Analysis of mobile apps
  • Treatment: The defined treatment for the vulnerability:
    • Untreated: The vulnerability treatment assignment is due
    • In progress: The remediation of the vulnerability has been assigned to a member of your team
    • Temporarily accepted: The vulnerability is accepted until a defined date
    • Permanently accepted: The vulnerability is accepted indefinitely
    • Treated: The vulnerability is no longer present
  • Report date: The date and time when the vulnerability was reported
  • Treatment acceptance: The status of a vulnerability acceptance request, which may be one of the following:
    • Submitted: The initial status of the request while waiting for the decision of a Vulnerability Manager or Group Manager
    • Approved: The request was approved by a member with any of the above roles
    • Rejected: The request was denied by a member with any of the above roles
  • Reattack: Status of reattack requests or outcomes, if applicable, which may be one of the following:
    • Pending: Fluid Attacks is yet to communicate the outcome of the requested reattack
    • On hold: The requested reattack is not possible until your team solves an event impeding testing
    • Verified open: The reattack evidences the vulnerability is still present
    • Verified closed: The reattack evidences the vulnerability is no longer present
  • Tags: Any tags you or your team have added to identify the vulnerability
  • False positive: Whether your organization has flagged the vulnerability as representing no risk to it
  • Assignees: The individuals assigned to address the vulnerability

To access the options to show, hide, or reorder columns, click the columns (Columns Icon) button. This causes a pop-up window to appear. On the left, you can make your selection, and on the right, reorder the enabled columns. Click Save to apply the changes.

Edit Vulnerability table columns on the Fluid Attacks platform

A way to quickly find what you are looking for in the table is typing the repository name in the search bar. Immediately, only the rows whose content matches your search are shown.

Search vulnerability location on the Fluid Attacks platform

You can limit the information you see on the table by clicking on the filters button (Filter Icon) and using one or more of the available options.

Find filters in Vulnerabilities on the Fluid Attacks platform
Click on the filters button
Filter by Technique on the Fluid Attacks platform
Select a filter option
Apply filters in Locations on the Fluid Attacks platform
Select values and apply filter

You can also use a selection of quick filters: Location, Status, and Origin.

Use quick filters on the Fluid Attacks platform

See inside a vulnerability

You can click on a vulnerability in the Vulnerabilities section to open a pop-up window with a header and multiple tabs: Details, Severity, Code (if applicable), Treatments (if applicable), How to fix, and Tracking. This window has a unique URL for easy sharing with team members or Fluid Attacks staff, which you can copy by clicking on the link icon.

The header is visible across the tabs and consists of tags that inform you of the vulnerability's Severity, Origin, Technique and Status information. If the vulnerability is in third-party software, a tag related to reachability is shown. This tag may have one of these values:

  • Latent: (a) The vulnerability is in a package declared in your code, but (b) the package is not imported.
  • Potential: (a) The vulnerability is in a package declared in your code, (b) the package is imported by your application's code, but (c) the vulnerability is not necessarily the vulnerable function described in the CVE entry.
  • Reachable: (a) The vulnerability is in a package declared in your code, (b) the related package is imported by your application's code, and (c) the vulnerability is the vulnerable function described in the CVE entry.

See the details of a specific vulnerability

The Details tab provides comprehensive information about the state of the selected vulnerability.

View vulnerability details on the Fluid Attacks platform

These are the details shown in this tab:

  • General information:
    • Location: The file path or environment URL
    • Specific LoC/port/input: The specific line of code, port number, or input field affected
    • Report date: The date the vulnerability was reported
    • Closing date: The date it was verified the vulnerability is no longer present or, for another reason, its Status changed from 'Open' to 'Closed'
    • Closing reasons: The reason the vulnerability's Status changed from 'Open' to 'Closed'
    • Commit hash: ID of the commit that created the vulnerability
    • False positive: Indicates if the False positive request has been applied to this finding (your organization requests this treatment if the finding poses no risk)
    • Tags: User-defined tags for identifying the vulnerability
    • Time to detect (days): The days it took to report the vulnerability since the commit that introduced it
    • Code author: Email of the contributor whose commit presents the vulnerability in question
    • Vulnerability description: Fluid Attacks' definition of the vulnerability
  • Reattacks:
    • Reattack status: If applicable, the outcome of the last reattack request (for possible values, see above)
    • Last requested date: The date of the most recent reattack request
    • Requester: The email of the member who requested the last reattack
    • Cycles: The total number of reattack requests for this vulnerability
    • Efficiency: The percentage representing one positive reattack outcome (confirming the vulnerability was fixed) out of all the reattacks carried out
  • Treatments:
    • Current treatment: The currently applied treatment for the vulnerability
    • Assignee: The email of the member assigned to address the vulnerability
    • Treatment date: The date the treatment was applied
    • Treatment expiration date: The expiration date for a Temporarily accepted treatment
    • Changes: The number of times the treatment of that vulnerability has changed
    • Bug tracking system url: URL of the issue in your bug-tracking system (BTS) related to this vulnerability
    • Justification: The reason provided for applying the treatment
  • Packages details: (Visible only for vulnerabilities found via SCA)
    • Dependency: The name of the vulnerable package
    • Transitivity: Whether the vulnerable file in your software is directly or indirectly related to the third-party component in question:
      • Direct: The file in your project explicitly imports and uses the third-party dependency
      • Transitive: The third-party dependency is required by your direct dependencies, but not directly imported by the file in your project
      • Undeterminable: For this file, it is impossible by anyone to determine whether the dependency is direct or transitive
    • Advisory ID: The associated Common Vulnerabilities and Exposures (CVE) identifier of the vulnerable version
    • %EPSS: The likelihood of the vulnerability being exploited compared to that of all other known vulnerabilities
    • Stage: The stage(s) in which your project depends on the third-party dependency:
      • Build: Your file depends on the third-party component only in the software development stage
      • Run: Your file depends on the third-party component in the live production environment
    • Reachability: Whether the function related to the vulnerability is called by your application's code (see a description of the possible values above)
    • Version status: Whether you are using the dependency in its latest version or a newer one is available (it also indicates the specific used version and the latest one)
    • Affected version: The vulnerable dependency version
    • CPEs: The string following the Common Platform Enumeration (CPE) for identifying the dependency
    • Namespace: Identifier indicating the supplier organization or project for the entry
    • Advisory URLs ([#]): Reference URLs (e.g., URL of the vulnerability advisory)
    • KEV: Whether the related vulnerability is in CISA's Known Exploited Vulnerabilities Catalog, meaning it has been exploited in the wild

Learn the severity of a specific vulnerability

The Severity tab provides detailed information about the CVSS severity score assigned to the specific vulnerability.

Know vulnerability severity on the Fluid Attacks platform

These are the details shown:

  • Vector CVSS v4.0 string: The values used to derive the score represented textually
  • The calculated severity score and its corresponding qualitative rating
  • The severity score breakdown showing the values for each metric along with a visual representation of the value

See the vulnerable line of code

The Code tab highlights the vulnerable code snippet and shows the code surrounding it, allowing you to pinpoint the issue directly within your codebase.

View the vulnerable line of code on the Fluid Attacks platform

Edit treatment for a vulnerability

The Treatments tab allows you to manage the treatment for the vulnerability, as well as manage tags and link to the related issue in a bug-tracking system. Read about these fields in Assign treatments.

View vulnerability treatments on the Fluid Attacks platform

Get a custom guide to fix the vulnerability

From the pop-up window, you can immediately get a step-by-step, custom, AI-generated guide to remediate the vulnerability. Simply select the How to fix tab or click the fix button (Fix Icon) and let Fluid Attacks' Custom fix feature create this useful resource for you to plan the remediation of the vulnerability in question. Bear in mind that this feature is not available for some vulnerabilities.

Find fix button on the Fluid Attacks platform
Click the fix button
Fix with AI on the Fluid Attacks platform
Get fixing guide

Get an automatic fix for the vulnerability

Automatic fix suggestions are currently only available on VS Code and Cursor using the Fluid Attacks extension. If Fluid Attacks has an automatic fix for the vulnerability, a button labeled Auto-fix appears after you click the How to fix tab or click the fix button (Fix Icon). Clicking on the button enables a pop-up window that displays requirements for using the feature and a link to download the extension.

Get autofix information on the Fluid Attacks platform

In the case of inherited vulnerabilities, the How to fix tab shows you what dependency versions you should upgrade to. To learn more, read See safe dependency versions.

See the history of a specific vulnerability

The Tracking tab allows you to see the management decisions made over a vulnerability over time, including changes in status, treatments, and other relevant details.

See timeline of a vulnerability on the Fluid Attacks platform

You can easily share the pop-up window for a vulnerability with others, as it has got a unique URL containing the vulnerability ID. To copy the URL, simply click on the copy icon (Copy Icon).

Get a vulnerability link on the Fluid Attacks platform

See the description of vulnerabilities

The Description section provides definitions and relevant characteristics to more clearly understand the issues and possible fixes.

View vulnerability description on the Fluid Attacks platform

Specifically, this section provides the following information:

  • Description: Fluid Attacks' definition of the weakness in question
  • Related requirements: The security requirements, according to Fluid Attacks' classification, that may have been violated
  • Impacts: What an attacker can achieve exploiting the vulnerability
  • Threat: The attack vector an attacker has to follow and the privileges they require to exploit the vulnerability
  • Recommendations: Advice for remediating the vulnerability
  • Do you need help with this vulnerability?: Link to schedule a video meeting to discuss the vulnerability with one of Fluid Attacks' pentesters

See evidence of exploitability

In the Evidence section you may find screenshots of code snippets demonstrating the presence of vulnerabilities and screenshots or videos showing the ethical exploitation of some of those vulnerabilities. You can click on these resources to enlarge them and then download them. Learn more details about this section in Examine the evidence of exploitability.

See vulnerability evidence on the Fluid Attacks platform

See the timeline of vulnerabilities

In the Tracking section, you can view vulnerabilities' timeline, detailing cycles which are marked by reattack outcomes and any temporary and permanent acceptance treatments. To see the timeline for a vulnerable line of code, input or port, refer to See the history of a specific vulnerability.

See the history of a type of vulnerability on the Fluid Attacks platform

See affected records

The Records section contains sensitive information gathered by Fluid Attacks' pentesters during ethical vulnerability exploitation. This information is specific to your organization and may include financial details (e.g., account numbers, transactions, credit card numbers), personal data (e.g., phone numbers, contacts, personally identifiable information) and technical information (e.g., roles, keys, access tokens).

See affected records on the Fluid Attacks platform

Comment on vulnerabilities

The Comments section is a forum-like space for discussions between your team and Fluid Attacks about the vulnerabilities in question. Any member can post a new thread or reply to an existing one. To learn more about this help option, read Post comments.

Comment on a type of vulnerability on the Fluid Attacks platform

Notify of a vulnerability

The Fluid Attacks platform allows you to send an email notification to members informing them of the vulnerabilities still present. To do this, follow these steps:

  1. Access the group where the target vulnerability was detected.
  2. In the Vulnerabilities section, click on the associated weakness.
    Select a type of vulnerability on the Fluid Attacks platform
  3. In the Vulnerabilities section, click on the notify button (Notify Icon).
    Notify team members of vulnerabilities on the Fluid Attacks platform
  4. In the pop-up window, confirm the delivery by clicking Notify.
    Confirm vulnerability notification on the Fluid Attacks platform
    The notification is then sent to members who have Vulnerability alert enabled.

Request reattacks

From Fluid Attacks' platform, you can send requests to verify the effectiveness of your code fixes. These retests done by Fluid Attacks are called reattacks. To request them, you have to check the boxes of the vulnerabilities in the Vulnerabilities section, and click on Reattack. Find the entire details about this feature in Verify fixes with reattacks.

Find the retest option on the Fluid Attacks platform

You can modify vulnerability management decisions from the platform's Vulnerabilities section. To make your modifications, follow these steps:

  1. Go to Vulnerabilities by clicking on a weakness name.
  2. In the table, select the checkbox on the left of the vulnerability that you need to edit.
  3. Click the Edit treatment button.
    Edit locations on the Fluid Attacks platform
  4. Make the necessary changes in the form. Treatment and Assignee can only be modified by Vulnerability Managers and Group Managers. (For the descriptions of the fields, read Assign treatments.)
    Add new vulnerability tag on the Fluid Attacks platform
  5. Click on Confirm to apply the changes.

Approve vulnerability acceptance requests

In the Vulnerabilities section, you can approve the request for a vulnerability to be temporarily or permanently accepted. You do this with the Treatment acceptance option. To learn all the details, read about this topic in Assign treatments.

Accept vulnerability treatment on the Fluid Attacks platform

On this page