Skip to main content
Vulnerability Management list showing all vulnerabilities with filters and states

Unified view of all vulnerabilities across assessments and assets

Overview

The Centralized Vulnerability List provides a single, comprehensive view of all vulnerabilities identified across your entire organization — from assessments, assets, and integrated scanners.
It enables teams to track, prioritize, and manage vulnerabilities efficiently, all from one place.
With intelligent filters, real-time states, and ownership visibility, this unified view removes the need to navigate multiple reports or dashboards. Every vulnerability is synced automatically from assessments and integrations, ensuring complete and current visibility.

Key Capabilities

Unified View

View all vulnerabilities from every source — assessments, integrations, and manual imports — in one consolidated table.

Real-Time Sync

Vulnerability data is continuously updated as new assessments complete or integrations refresh.

Advanced Filtering

Use granular filters to find vulnerabilities by severity, assessment, state, team, or owner.

Ownership & Assignment

See who owns each vulnerability and its current remediation progress.

Filtering toolbar with filters for severity, assessment, owner, state, and teams

Advanced filtering options for vulnerabilities

Filters make it simple to pinpoint vulnerabilities of interest. You can filter and search using:
  • Severity – Critical, High, Medium, Low
  • Assessment – Specific assessments or projects
  • Owners – Filter by assigned remediation owners
  • State – In review, In progress, Re-test, Resolved, etc.
  • Teams – View vulnerabilities assigned to particular departments
The search bar supports keyword lookups across vulnerability titles, domains, and affected assets.
Combine multiple filters for advanced queries — for example, Critical vulnerabilities in Docker assessments assigned to Team A.

Vulnerability States

Each vulnerability moves through clear, trackable states — making it easy to monitor progress and identify bottlenecks in remediation:
StateDescription
In ReviewUnder review by analysts or awaiting validation.
In ProgressActively being worked on by developers or engineers.
Re-TestUndergoing validation after remediation.
ResolvedVerified as fixed and no longer exploitable.
UnresolvedNot yet addressed or awaiting confirmation.
False Positive / Not ApplicableMarked as invalid or irrelevant to the environment.

Sorting and Prioritization

Vulnerabilities can be sorted by severity, state, owner, or date reported — helping teams prioritize their response efficiently.
You can also group by assessments or filter by remediation responsibility.

Linking to Context

Each vulnerability record links directly to:
  • The originating assessment (for traceability)
  • Associated asset or endpoint (for impact analysis)
  • Evidence and remediation notes
This ensures every issue remains fully contextualized and actionable within your workflow.

Explore Live Demo

Explore Snapsec Live — No Signup Needed

Jump straight into the live environment and see how Snapsec unifies asset intelligence, threat detection, and vulnerability tracking — all in one dashboard.