Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Now, we can attach our tag to a vulnerability. Go to

You can do so within the Vulnerability Details page, clicking the Action dropdown and selecting Manage Tags.

Image Added


You can also do so within the vulnerability tree view on your application’s detail page.

...

The tag we just created was called "Unfiltered inputs," so let’s open up the SQL Injection node. A list of SQL Injection vulnerabilities appears.


Select the Check All checkbox at the top of the vulnerability list and one or more vulnerabilities and click on the Action dropdown. Select Batch Tagging.

Image Removed


Select the tag you just created, and click Batch Tagging.With the 'Add Selected Tags' option still selected (default), click the Tag dropdown and select the tag(s) that you wish to add, then click the Batch Tagging button.

Image Added


You will see that each of the selected vulnerabilities has been tagged, like so:

...

You may have noticed that this process used batch tagging as well, launched from the tree-view of open vulnerabilities.


Remove a Vulnerability Tag from a Vulnerability

You may also remove vulnerability tags from one or more vulnerabilities by selecting the 'Remove Selected Tags' option in the Batch Tagging Vulnerabilities modal.

Image Added