Kaspersky Container Security
Selecting vulnerabilities to display
Selecting vulnerabilities to display
To use the filter buttons located above the table to select vulnerabilities to display in the table:
- Click the filter buttons with the values you want to display. Vulnerabilities can be selected based on the following criteria:
- Vulnerabilities by detection location:
- Image in registries.
- Image deployed in a runtime.
- CI/CD object.
- Vulnerabilities by severity level:
- Negligible.
- Low.
- Medium.
- High.
- Critical.
By default, all detection locations and vulnerability severity levels are selected.
- Vulnerabilities by detection location:
- If necessary, use the Disabled / Enabled switch to enable or disable the display of only vulnerabilities with available exploits. By default, the switch is set to Disabled.
- If necessary, enter a vulnerability ID or resource name in the search field.
To use a filter to select vulnerabilities to display in the table:
- Click the filter icon (
) above the table with the list of users.
- In the opened sidebar, use the Disabled / Enabled toggle switch to enable or disable the display of only vulnerabilities with available exploits. By default, the switch is set to Disabled.
- To determine the severity level, select one of the following options: Severity level or Score, and then do the following:
- If you select Severity level, select the buttons with the values that you want to display. You can select the following display values:
- Negligible.
- Low.
- Medium.
- High.
- Critical.
By default, all vulnerability severity levels are selected.
- If you select Score, use the slider to define the vulnerability score. Values from 0 to 10 are available. The solution will display vulnerabilities that match the specified vulnerability score.
- If you select Severity level, select the buttons with the values that you want to display. You can select the following display values:
- For the Vendor fix setting, specify whether a fix is available from the vendor: All, Available or Not available. The default value is All.
- For the Risk acceptance setting, specify whether the selected vulnerability has been accepted in the specified resource: All, Accepted, or Not accepted. The default value is All.
- For the Location details setting, specify the location where the vulnerability was detected:
- Image in registries.
- Image deployed in a runtime.
- CI/CD object.
By default, all detection locations are selected.
Article ID: 291052, Last review: Dec 5, 2024