See vulnerabilities assigned to you | Fluid Attacks

See vulnerabilities assigned to you

If you want to organize your daily tasks on our platform, our To do feature is your go-to tool. With this function, you can keep track of all vulnerabilities assigned to you, ensuring efficient monitoring of your daily tasks. Accessing it is simple: Click on the To do button in the top bar.

ToDoList table

However, an initial question could be: How can we assign vulnerabilities to our team? Enter this link, and you will see how to do it!

Note: Members with the User Manager or Vulnerability Manager role can assign vulnerabilities to any member of the group.

Know your To do table

Role required: User, Vulnerability Manager or User Manager
The To do table provides a clear overview of vulnerabilities assigned to you, which you are responsible for resolving. This section displays the following information:

ToDo table

  • Organization: The name of the organization where the specific vulnerability is identified.
  • Group name: The name of the group containing the vulnerability, clicking on it redirects you to the Vulnerabilities section of the group.
  • Type: The type of vulnerability. When you click on it, you are redirected to the description of that location.
  • Vulnerability: Indicates where the vulnerability is located.
  • Evidence: Clicking on View will redirect you to the Evidence section of the type of vulnerability.
  • Last reattack: The Reattack status requested in the list of vulnerabilities assigned to the user.
  • Severity: Severity level based on the CVSS.
  • Tags: The tags that were defined at the time of assigning the vulnerability.

Edit Treatment

Role required: Vulnerability Manager or User Manager
Members with the User role can assign fix work to themselves and edit the External BTS, Tags and Level values.
To edit the Treatment, you must select it in the check box on the left of the vulnerability in question and then click Edit button.

Edit button

A pop-up window will appear for you to edit the vulnerability. You can modify fields such as Treatment, Assigned and other related details here. To save the changes you have made, click the Confirm button.

Edit window

Please keep in mind that any changes you make will trigger notifications. Note that the editing options are based on your assigned role. To gain a better understanding of roles, click here.

Request a reattack

Role required: User, Vulnerability Manager or User Manager

You can perform the Reattack action in the Locations and To do sections. Remember that a reattack is when you have already applied a solution for an existing vulnerability and you want to validate its effectiveness.

To perform a reattack from the To do section, you have to select which vulnerability you want to validate by clicking on the check box on the left and then the Reattack button.

Reattack ToDoList

A pop-up window will appear asking you for the justification you applied in the solution; remember that this justification is composed of 10 or more characters. When you have typed the validation, click on the Confirm button.

Justification ToDo

Here this vulnerability enters in Requested status awaiting for the verification of its solution. We invite you to enter here to understand the status of the reattacks and their validation procedure.

Filter To do table

Role required: User, Vulnerability Manager or User Manager

Filters are one of the features found throughout our platform, helping us to analyze data quickly. The filters in this section are located on the right side next to the search bar.

Filters ToDo

Here you can filter by OrganizationGroup nameTypeLast reattackSeverity and Tags. Note that you must set clear filters since the filter you apply will be maintained until you change any of these.

Filters options

Refresh To do table

Role required: User, Vulnerability Manager or User Manager

If you need to refresh the To do table view, you can do so with the button on the right next to the reattack button.

refresh

Search the To do table

Role required: User, Vulnerability Manager or User Manager

The search bar filters the information contained in the columns of the table.