Manage vulnerabilities
See where vulnerabilities are and more details
See the list of vulnerabilities detected Role required: User, Vulnerability Manager or User Manager Vulnerabilities is the initial section you encounter upon entering a group. If you hover your mouse cursor over the title of the Vulnerabilities tab, ...
Examine the evidence of exploitability
The Evidence section provides supporting proof of the existence and exploitation of a particular vulnerability. To go there, enter your group, click on a type of vulnerability and select Evidence from the tabs. In this section, Fluid Attacks' ...
Request a vulnerability be dismissed as Zero Risk
Role required: User, Vulnerability Manager or User Manager Note: Zero Risk requests generated by members with the User role must be approved by a Vulnerability Manager or User Manager before they are considered by Fluid Attacks. Without this member's ...
See vulnerabilities assigned to you
If you want to organize your daily tasks on our platform, our To do feature is your go-to tool. With this function, you can keep track of all vulnerabilities assigned to you, ensuring efficient monitoring of your daily tasks. Accessing it is simple: ...
Assign Treatments
A Treatment represents the business decision that you make concerning a vulnerability. This choice focuses on how to approach or remediate the vulnerability. In this section, we will guide you on how to apply different Treatments handled in our ...
Verify fixes with reattacks
Request a reattack Role required: User, Vulnerability Manager or User Manager When you have implemented a solution for an existing vulnerability, you can request a reattack to validate its effectiveness. This can be done from the Locations and To do ...