Kaspersky Container Security

Selecting vulnerabilities to display

To use the filter buttons located above the table to select vulnerabilities to display in the table:

  1. Click the filter buttons with the values you want to display. Vulnerabilities can be selected based on the following criteria:
    • Vulnerabilities by detection location:
      • Image in registries.
      • Image deployed in a runtime.
      • CI/CD object.
    • Vulnerabilities by severity level:
      • Negligible.
      • Low.
      • Medium.
      • High.
      • Critical.

    By default, all detection locations and vulnerability severity levels are selected.

  2. If necessary, use the Disabled / Enabled switch to enable or disable the display of only vulnerabilities with available exploits. By default, the switch is set to Disabled.
  3. If necessary, enter a vulnerability ID or resource name in the search field.

To use a filter to select vulnerabilities to display in the table:

  1. Click the filter icon (Filter icon.) above the table with the list of users.
  2. In the opened sidebar, use the Disabled / Enabled toggle switch to enable or disable the display of only vulnerabilities with available exploits. By default, the switch is set to Disabled.
  3. To determine the severity level, select one of the following options: Severity level or Score, and then do the following:
    • If you select Severity level, select the buttons with the values that you want to display. You can select the following display values:
      • Negligible.
      • Low.
      • Medium.
      • High.
      • Critical.

      By default, all vulnerability severity levels are selected.

    • If you select Score, use the slider to define the vulnerability score. Values from 0 to 10 are available. The solution will display vulnerabilities that match the specified vulnerability score.
  4. For the Vendor fix setting, specify whether a fix is available from the vendor: All, Available or Not available. The default value is All.
  5. For the Risk acceptance setting, specify whether the selected vulnerability has been accepted in the specified resource: All, Accepted, or Not accepted. The default value is All.
  6. For the Location details setting, specify the location where the vulnerability was detected:
    • Image in registries.
    • Image deployed in a runtime.
    • CI/CD object.

    By default, all detection locations are selected.