This section will guide you through the vulnerabilities dashboard of Kiuwan Code Security.
Contents:
The Code Security Vulnerabilities dashboard provides a detailed view of the application’s vulnerabilities. It allows you to:
- Search for vulnerabilities according to multiple search criteria
- Order and group vulnerabilities by different characteristics
- Inspect details of every single vulnerabilities
- Access to vulnerability description and remediation tips
![](/docs/download/attachments/13533191/Vulnerabilities%20Dashboard2.png?version=1&modificationDate=1653538876000&api=v2)
Summary data
The summary section displays group information on vulnerabilities:
- By Vulnerability Type: number of vulnerabilities for every type (please see Vulnerability Types )
- By Language: number of vulnerabilities found for every programming language
- By Priority: number of vulnerabilities found by priority (according to security rules priorities as defined in the model used for the analysis)
Figures are also displayed for
- Violated Rules: number of security rules (checks) with associated vulnerabilities
- Vulnerabilities: total number of vulnerabilities found in app source code
- Very High: number of Very High vulnerabilities
- Security Rating: overall application security rating
![](/docs/download/attachments/12812682/sec-9.PNG?version=1&modificationDate=1486124944000&api=v2)
Click the burger menu on the top-left to:
- Compare analysis results with any other analysis
- Mute vulnerabilities
- Export vulnerabilities to CSV format
- Export to ThreadFix
- Export in PDF format
![](/docs/download/attachments/13533191/Vulnerabilities%20Burger%20Menu.png?version=1&modificationDate=1575622761000&api=v2)
Detailed data
Along with these metrics, Vulnerability page displays a full list of defects that you can browse, filter and order by following criteria:
![](/docs/download/attachments/13533191/Files%20filter.png?version=1&modificationDate=1575622940000&api=v2)
- Search by rule name
- Priority - low to high
- Characteristic - main software analytics categorization of the selected rule
- Vulnerability Type - security topic addressed by the selected security rule
- Language - programming language
- Normative - security standard
- CWE Scope
- Framework
- Tags
- Muted - muted rules or not
- Status - reviewed or not
You can also group by Rule or Files
Click on a vulnerability row to see more details:
![](/docs/download/attachments/13533191/Expanded%20rule.png?version=2&modificationDate=1575624046000&api=v2)
- Which files contain this vulnerability
- The specific location of the vulnerability in the source code