The Vulnerability Registry contains a list of all the vulnerabilities detected by ZeroThreat. You can search for specific vulnerabilities or filter them by severity. It allows organizations to view, customize, and manage vulnerability definitions according to their internal risk model, business context, and security policies.
Every application is different. A vulnerability that is critical for one organization may be informational or an acceptable risk for another. The Vulnerability Registry enables you to reflect this reality by giving you control over how vulnerabilities are described, scored, and treated across your organization.
Clicking on a vulnerability opens its detailed view, showing how the vulnerability is defined and presented across scan results and reports. This view provides key information such as the vulnerability title, detection source, assigned severity, CVSS score, descriptive context, recommended remediation guidance, and associated industry references including CWE identifiers and OWASP Top 10 mappings.
From this view, you can also edit and manage how the vulnerability is treated across your organization by clicking the Edit () icon.
Description: if needed you can update the vulnerability description to provide a clearer and more accurate explanation of the vulnerability.
Registry Severity: You can also change the registry severity (Critical, High, Medium, Low, Informational) to better reflect the actual risk of the vulnerability in your environment.
Why update severity?
Adjusting the registry severity is useful when the real-world impact of a vulnerability varies based on business context. For example, directory listing might be considered low impact for a public marketing website, but high impact for a financial or healthcare application where exposed files could reveal sensitive customer or regulatory data.
Remediation guidance allows you to customize instructions on how a vulnerability should be fixed within your organization. By aligning remediation steps with internal practices, approved standards, and existing tooling, you make fixes clearer, more consistent, and easier for engineering teams to act on.
Within the same edit view, the Vulnerability Registry provides an Ignore Vulnerability toggle.
When enabled:
The vulnerability is ignored in all past scan results
The vulnerability is not reported in future scans
This option is useful when:
A vulnerability is a known and accepted risk
The issue is not applicable to your technology stack
The finding is not relevant within your threat model
Ignoring a vulnerability from vulnerability registry is an organization-wide action. Use this option carefully, as it affects both historical visibility and future detection.For ignoring a vulnerability at an individual scan level, you can do so directly from the corresponding scan report
The Vulnerability Registry enables organizations to move beyond one-size-fits-all vulnerability reporting. By tailoring vulnerability definitions to your environment, ZeroThreat helps you focus on what actually matters, improve remediation efficiency, and produce more meaningful security reports.