bookVulnerability Registry Configuration

The Vulnerability Registry contains a list of all the vulnerabilities detected by ZeroThreat. You can search for specific vulnerabilities or filter them by severity. It allows organizations to view, customize, and manage vulnerability definitions according to their internal risk model, business context, and security policies.

Every application is different. A vulnerability that is critical for one organization may be informational or an acceptable risk for another. The Vulnerability Registry enables you to reflect this reality by giving you control over how vulnerabilities are described, scored, and treated across your organization.


Accessing the Vulnerability Registry

To access the Vulnerability Registry:

  1. Navigate to Organization Settings in ZeroThreat.

  2. Under the corresponding organization, Select Vulnerability Registry

Organization Settings
  1. You will see a searchable and filterable list of vulnerabilities detected by ZeroThreat.

Vulnerability Registry
Vulnerability Registry

From here, you can:

  • Search for a specific vulnerability by name

  • Filter vulnerabilities by severity

  • Open any vulnerability to view its details

  • Edit vulnerability metadata to match your organizational context


Viewing and Managing Vulnerability Details

Clicking on a vulnerability opens its detailed view, showing how the vulnerability is defined and presented across scan results and reports. This view provides key information such as the vulnerability title, detection source, assigned severity, CVSS score, descriptive context, recommended remediation guidance, and associated industry references including CWE identifiers and OWASP Top 10 mappings.

From this view, you can also edit and manage how the vulnerability is treated across your organization by clicking the Edit () icon.

You can customise the following fields:

Basic Information

  • Description: if needed you can update the vulnerability description to provide a clearer and more accurate explanation of the vulnerability.

  • Registry Severity: You can also change the registry severity (Critical, High, Medium, Low, Informational) to better reflect the actual risk of the vulnerability in your environment.

Basic Information
circle-info

Why update severity?

Adjusting the registry severity is useful when the real-world impact of a vulnerability varies based on business context. For example, directory listing might be considered low impact for a public marketing website, but high impact for a financial or healthcare application where exposed files could reveal sensitive customer or regulatory data.

Severity and Risk Scoring

  • CVSS v3.1 Score: Update the numerical score and severity classification if the default scoring does not align with impact in your business context.

  • CVSS Severity: Define the severity level (Low, Medium, High, Critical) based on the impact

  • CVSS Vector String: Modify the vector string to accurately represent exploitability and impact in your environment.

CVSS v3.1 Assessment

Remediation Guidance

Remediation guidance allows you to customize instructions on how a vulnerability should be fixed within your organization. By aligning remediation steps with internal practices, approved standards, and existing tooling, you make fixes clearer, more consistent, and easier for engineering teams to act on.

Remediation Guidance

Standards and References

  • CWE References: Add, remove, or update CWE IDs associated with the vulnerability.

  • OWASP Top 10 Mapping: Map the vulnerability to the appropriate OWASP Top 10 category relevant to your organization or compliance needs.

CWE and OWASP References

Ignoring a Vulnerability

Within the same edit view, the Vulnerability Registry provides an Ignore Vulnerability toggle.

When enabled:

  • The vulnerability is ignored in all past scan results

  • The vulnerability is not reported in future scans

This option is useful when:

  • A vulnerability is a known and accepted risk

  • The issue is not applicable to your technology stack

  • The finding is not relevant within your threat model

circle-exclamation

Impact on Scan Results and Reports

Any changes made in the Vulnerability Registry are retroactive and forward-looking:

  • Updates apply to all previous scan results

  • Updates automatically affect all future scans

Scan reports immediately reflect:

  • Updated severity

  • Modified descriptions

  • Revised remediation guidance

  • Updated CWE and OWASP mappings

Updated Description

This ensures consistency across past scan reports, dashboards, and shared reports.


Conclusion

The Vulnerability Registry enables organizations to move beyond one-size-fits-all vulnerability reporting. By tailoring vulnerability definitions to your environment, ZeroThreat helps you focus on what actually matters, improve remediation efficiency, and produce more meaningful security reports.


What’s Next?

  • Head over to Report Configuration to see how you can white-label scan reports to reflect your organization’s branding and identity.

Last updated