Detections tell you about security findings discovered by our cloud security service. These are based on your most recent scans. To review your current detections, go to Detections > Detections. You can sort detections by web application or filter the list numerous ways - by tags, scan date, severity and more.
Want to see the flow? Look hereLook here
New - The first time a vulnerability is detected by a scan the status is set to New.
Active - A vulnerability detected by two or more scans is set to Active.
Fixed - A vulnerability was verified by the most recent scan as fixed, and this vulnerability was detected by the previous scan.
Reopened - A vulnerability was reopened by the most recent scan, and this vulnerability was verified as fixed by the previous scan. The next time the vulnerability is detected by a scan, the status is set to Active.
Protected - A vulnerability that is blocked for an application protected by WAF.
Retesting - A vulnerability that is being retested.
The groups column identifies the group each detection belongs to.
For vulnerability detections, XSS appears for cross-site scripting vulnerabilities, SQL for SQL injection vulnerabilities, INFO for information vulnerabilities and PATH for path-based vulnerabilities.
For sensitive content detections, CC appears for credit card number detections, SSN for social security number (US only) detections, CUSTOM for custom (user-defined) sensitive content detections.
For information gathered, IG_DIAG for diagnostic IG (general information about the scan), IG_WEAK for weakness IG (issues that are security weakness or conflict with best practices) detections.
We have filters to enhance the search and quickly locate the detection type. In addition to the detections search tokens, we provide ready to use token based filters in the left pane. We provide filters to find detections by source, status and by confirmed and potential vulnerabilities. Additionally, you can fasten your search, by directly using search tokens for QID or finding ID.
You can distinguish the finding type with the icon displayed in the list.
- Qualys detections
- Burp detections
- Bugcrowd detections
By default, the status of a detection won't be changed when the vulnerable URL of the detection isn't found anymore during a scan. There exists a per-customer configuration option to have this behavior changed. You need to send a request to your TAM or Qualys Support if you want to have this feature for your subscription. After the setting is enabled for your subscription, the detection status will be changed to "Fixed" when the vulnerable URL is not found in the scan.
Yes, you can export detection details to your local file system in HTML format. In the Payload Details windows, scroll down to go to the Response section. Click the three vertical dots displayed at the right side and then click Export. Show meShow me