In the following, you'll learn to prioritize third-party, code-level, and runtime vulnerabilities based on
Third-party vulnerabilities
The risk level (severity) of a vulnerability is calculated based on Davis Security Score (DSS), so you can focus on fixing vulnerabilities that are relevant in your environment, instead of on those that have only a theoretical impact. See below for your options.
Use Davis Security Score filters to focus on vulnerabilities based on their severity and risk classification.
On the Prioritization page, in the filter field, you can filter by
For details, see Filter expressions.
View how the Davis Security Score is calculated for individual vulnerabilities.
To learn more about DSS, see Concepts: Davis Security Score.
Prioritize vulnerabilities by analyzing the risk factors and assessment modes taken into consideration when determining the Davis Security Score. By understanding the assessment modes behind the Davis Security Score, you can make smarter remediation decisions, tailor your response to business impact, and stay ahead of emerging threats. See below for your options.
Use filters to narrow down vulnerabilities based on Davis Security Score assessment modes and associated risk factors.
For details, see Filter expressions.
Investigate which database services are impacted by the vulnerability and trace direct connections to affected assets.
Third-party vulnerabilities
Identify which functions are affected by the vulnerability and assess their usage within your application.
To learn more about the risk factors, see Concepts: Risk factors.
Identify what’s at risk by examining the entities connected to each vulnerability. See below for your options.
Understand how a vulnerability affects process groups or Kubernetes nodes—see how many are affected, resolved, or muted, and what percentage they represent. Track remediation progress, exposure level, and overall impact.
Explore entities connected to affected process groups or Kubernetes nodes to uncover indirect exposure, trace root causes, and assess the broader impact of vulnerabilities. Open these entities in compatible apps to investigate further and take targeted action.
To learn more about affected and related entities, see Concepts: Affected and related entities.
Code-level vulnerabilities
Prioritize vulnerabilities based on observed exploit activity to better understand exposure and response patterns. View how frequently a vulnerability has been targeted, what actions were taken in response, and key details from recent attempts to help guide your remediation efforts. Adjust timeframe and segments and open exploits in the Threats & Exploits app for further insights.
To detect exploit attempts you need to set up Runtime Application Protection.
Track vulnerability evolution to understand severity changes over time and prioritize response accordingly.
Historical context helps clarify whether a vulnerability has always been critical or recently escalated. For example, if a Medium
severity issue becomes Critical
, you'll know it wasn't neglected—it simply evolved and now demands attention. Without this timeline, a newly critical vulnerability might appear to have been overlooked for longer than it actually has.
Events are stored for one year and can only be queried up to the timestamp of when the vulnerability was first detected.
Third-party vulnerabilities
Leverage the CISA KEV catalog to prioritize vulnerabilities based on known exploit activity and remediation deadlines—so you can focus on threats with real-world impact and regulatory urgency. See below for your options.
On the Prioritization page, use the filter field to
CISA KEV
> CISA KEV - In catalog
> Yes
/No
)CISA KEV
> CISA KEV - Due date
, then enter the target date, in YYYY-MM-DD
format)CISA KEV
to add the CISA KEV column to the results table.Vulnerabilities with missed remediation deadlines are labeled Overdue.
For GCP deployments, data may lag behind the CISA KEV catalog by approximately two to four weeks.