The following explains the concepts specific to drilling down into the source of vulnerabilities:
Third-party vulnerabilities
A vulnerable component is a software component (library) or runtime component (for example, a Kubernetes package) that has a vulnerable function causing a vulnerability:
org.apache.tomcat:tomcat-coyote
Java runtime
, Node.js runtime
Drill down into the source of vulnerabilities: Explore vulnerable components.
Why is a fixed vulnerability still showing as open.
Code-level vulnerabilities
An entry point is a point in the code where an attacker could enter the application, for example, by passing user input fields to the application (such as a login form or search bar).
The path used in the HTTP request to reach and potentially exploit the vulnerability.
/user/1218/bio
The input that is passed to the vulnerable function.
Example:
The user-controlled inputs that could be used to exploit the vulnerability. If there's a key for the payload (for example, an HTTP parameter name or an HTTP header name), it's displayed after the colon.
HTTP parameter value: bioText
Drill down into the source of vulnerabilities: Explore entry points.
Code-level vulnerabilities
A code location shows where the actual vulnerability is in the code (the location where the vulnerable function is called from).
SQL injection at DatabaseManager.updateBio():82
Drill down into the source of vulnerabilities: Explore code location.