Deduped Findings
Prioritized by exploitability, CVSS, exposure, and recency. Click any row for full details.
Loading scans...
Quick AI Actions
Pre-configured prompts for common security analyst workflows
Validate Finding
Summarize evidence and assess exploitability
Prioritize Queue
Rank by exploitability × data sensitivity
Map to NIST
Map findings to NIST CSF and 800-53
Similar Cases
Find historical fixes and solutions
Legend:
No auth
User auth
Admin auth
Public exploit
NEW
New findingREG
RegressedKeyboard: Enter open details ·Shift+A add to chat ·Shift+F mark FP ·Shift+M merge ·Shift+R accept risk ·Ctrl+/ chat
| Signals | Endpoint | Exploitability | Evidence | Scanner(s) | ||||||
|---|---|---|---|---|---|---|---|---|---|---|
| No results found. | ||||||||||
Showing 0 of 0