Vulnerabilities Page
The Vulnerabilities lake serves as your central hub for viewing and managing all security vulnerabilities discovered by your connected scanners. This comprehensive view helps you quickly identify, prioritize, and track security issues across your entire organization.Uploading Vulnerability Reports
In addition to automatically collecting vulnerabilities from connected scanners, you can manually upload vulnerability reports using the Upload Report action at the top of the page.What You’ll See
Vulnerability Metrics
At the top of the page, you’ll find summary metrics including:- Total number of unresolved vulnerabilities
- Breakdown by source
- Breakdown by severity (Critical, High, Medium, Low)
- SLA compliance Breakdown
Vulnerability List
Each vulnerability is displayed as a card showing:- Source: Icon indicating the source scanner
- Title: Description of the vulnerability and its origin
- Type: Vulnerability type being addressed
- Severity: Color-coded badge (Critical, High, Medium, Low)
- Repository: for vulnerabilities originated from code
- Image: for vulnerabilities originated from runtime
- Issue ID: External reference link to the scanner’s findings
- Detection Date: When the vulnerability was first discovered
- SLA Status: Time remaining or overdue indication
- Status: Current state (Open, In Progress, Resolved, etc.)
- Remediation: Link to associated remediation efforts
Filtering and Search
Find specific vulnerabilities quickly using multiple filter options:Available Filters
Available Filters
- Text Search: Search by vulnerability title or description
- Source: Filter by the scanner that detected the issue
- Type: Filter by vulnerability type
- Severity: Show only specific severity levels
- Repository: Filter by repository name (for code-originated vulnerabilities)
- Image: Filter by container image (for runtime-originated vulnerabilities)
- Issue: The vulnerability identifier
- SLA: Filter by time to SLA deadline
- Status: Filter by current vulnerability status
Working with Vulnerabilities
Viewing Details
Click on any vulnerability card to open a detailed drawer showing:- Complete vulnerability description
- Status and explanation about the state of the vulnerability
- Affected packages and versions
- Related vulnerabilities
- Links to external resources (pull requests, tickets)
Taking Action
From the vulnerability drawer, you can:- View the full vulnerability details and recommendations
- Navigate to the source repository
- Check associated remediation efforts
- Access related pull requests or tickets
Navigation
Understanding Severity Levels
Critical
Requires immediate attention. Default SLA: 3 days.
High
Significant risk. Should be addressed quickly. Default SLA: 14 days.
Medium
Moderate risk. Plan for resolution. Default SLA: 30 days.
Low
Minor issues. Address as capacity allows. Default SLA: 90 days.
SLA timelines can be customized in Settings to match your organization’s security policies.
Exploit Signals
Beyond severity ratings, Backline automatically calculates exploit signals for each vulnerability. These signals (scored 0-100) indicate how likely a vulnerability is to be exploited in the real world based on threat intelligence from multiple sources.YES - Exploitable
Active exploitation or PoC code exists. Patch immediately regardless of severity.
UNCERTAIN
Moderate exploitation signals. Monitor closely for escalation.
NO - Unlikely
No exploitation evidence yet. Follow standard SLA based on severity.
N/A
Insufficient threat intelligence data available.
Supported Report Types
Backline currently supports the following vulnerability report types: SCA (Software Composition Analysis) reports from these sources:- Trivy - JSON format
- OSV - JSON format
- Custom Report - CSV format with YAML configuration
- Custom Report - CSV format with YAML configuration
How to Upload a Report
Select Report Type
Choose your report type:
- SCA scan: For Software Composition Analysis vulnerability reports
- Image scan: For container image vulnerability reports
Configure Based on Report Type
For SCA scan:
- Select your source scanner:
- Trivy: Upload a JSON file in Trivy’s standard format
- OSV: Upload a JSON file in OSV’s standard format
- Custom Report: Upload a CSV file with a YAML configuration (see below)
- Choose the repository that this vulnerability report relates to from the dropdown
- Optionally configure Local Repository settings (see below)
- Upload the report file (CSV) and YAML config file (see Custom Report Configuration section)
Configure Local Repository (Optional - SCA only)
If your SCA report was generated from a local environment:
- Check the Local Repository checkbox
- Specify the path to the root of your repository in your local environment
- This helps Backline correctly map file paths in your scan results to your source code structure
Custom Report Configuration
When using the Custom Report option, you need to provide two files:- Report File (CSV): A CSV file containing your vulnerability report details
- YAML Config File: A configuration file that maps your CSV columns to Backline’s expected fields
Setting Up the YAML Config File
Setting Up the YAML Config File
- Click Download Config File in the upload dialog to see the required mapped fields
- For each required field in the config, specify the column title from your CSV file
- Example mapping:
- Ensure the column names in your YAML exactly match the headers in your CSV file
After Upload
Once your report is uploaded, Backline will:- Analyze all vulnerabilities in the report
- De-duplicate vulnerabilities that already exist in the system
- Set remediation plans for vulnerabilities where fixes are available
- Display the new vulnerabilities in your Vulnerabilities lake
Processing large reports may take a few minutes. You’ll see the vulnerabilities appear in your dashboard once processing is complete.