Getting Started with Vulnerability Management

Au

Adarsh

February 5, 2026

The Vulnerability Management feature in the Uproot Security platform allows organizations to identify, track, and remediate security vulnerabilities across web applications, cloud infrastructure, network, or mobile applications. It provides a centralized workflow for creating targets, running assessments, reviewing findings, and managing remediation efforts, giving teams clear visibility into vulnerability status and remediation progress.

Vulnerability management starts by defining a target and running assessments to find security vulnerabilities.

Creating a Target

A target represents the asset you want to assess for vulnerabilities, such as a web application, cloud infrastructure, network, or mobile application.


To create a new target:

  1. Navigate to Vulnerability Management.
  2. Open the Targets tab.


Image

  1. Click Create Target.
  2. In the dialog, select the Target Type: Web Application, Cloud Infrastructure, Network, or Mobile Application.

Image

  1. Enter Target Details:
    1. Target Name – a unique name to identify the asset
    2. Description (optional) – additional context
    3. Test Type – Internal (your team) or External (Uproot Security)
    4. Test Cycle – how often the target should be tested


Image

  1. Click Create Target to save.
    Once created, the target becomes the central entity for tracking assessments and vulnerabilities.


Targets Overview

Each target provides a summary view that includes:


Image

Assessments

Assessments represent individual security testing efforts performed against a single target. They can be conducted in two ways:

  • Internal assessments – Performed by the client’s internal security or engineering team.
  • External assessments – Performed by Uproot Security.


To create an assessment:

  1. Navigate to Vulnerability Management.
  2. Select the target application you want to assess from the target list.
  3. Open the Assessments tab for the selected target.

Image

  1. Click Create Assessment.
  2. In the Scope step:
  • Select the environment type (Staging or Production).
  • Enter the Environment URL.
  • Add additional hosts, if required.
  • (Optional) Enable subdomain enumeration, if applicable.


Image

  1. In the Users step, add user credentials for testing (optional).
    Image
  2. In the Technology step:
  • Select the databases used by the application.

Image


  • Select the frameworks used by the application.
  • Select the programming languages used by the application.
  • Select the cloud infrastructure used by the application.
  • Select the payment gateways integrated with the application.
  • Select the CMS used by the application, if applicable.
  1. In the Headers step, add custom HTTP headers required for the assessment (optional)Image
  2. In the Additional Information step:
  • Describe the key features of the application.
  • Provide an overview of the application and its purpose.

Image

  1. In the Name & Description step, enter a unique Assessment Name and Description.

Image

To view assessments for a target:

  1. Open the target from the Targets list.


Image

  1. Navigate to the Assessments tab.

Image

Assessment Details

The assessment view provides a comprehensive overview of scope, technology, and application context.

  1. Scope

Image

Includes:

  • Environment (e.g., Production)
  • Environment URL
  • Additional Hosts
  • Subdomain Enumeration status
  1. Technology

Documents the technology stack involved in the assessment, such as:

  • Databases (e.g., PostgreSQL, Redis)
  • Frameworks (e.g., React.js, Next.js)
  • Programming languages (e.g., Node.js)
  • Cloud infrastructure (e.g., Docker, AWS ECS)

3. Application Information

Provides basic context about the application under assessment.

Includes:

  • Application description - Provides testers with a clear understanding of the platform and its purpose.
  • Key application features - Highlights critical features that should receive special attention during testing.

4. Vulnerabilities Found in the Assessment

Summarizes all vulnerabilities identified during the assessment and their current status.

Includes:

  • Open
  • Resolved
  • Fixed
  • False Positives
  • Accepted Risk

This information helps reviewers understand potential risk areas.


Vulnerabilities

Vulnerabilities are the security findings identified during an assessment.

To view vulnerabilities:

  1. Open the target.


Image

  1. Navigate to the Vulnerabilities tab.

All vulnerabilities identified across multiple assessments for the target are displayed here.

To view vulnerabilities for a specific assessment, select the relevant assessment from the Assessments tab.

Image

The vulnerabilities table includes:

  • Name
  • Severity (Low, Medium, High)
  • Status (Open, Fixed, Resolved, False Positive, Accepted Risk)
  • Reported by
  • Assigned to
  • Reported date

Summary counters provide a quick snapshot of open, resolved, fixed, and accepted risks.


Viewing Vulnerability Details

Clicking on a vulnerability opens the Finding Details panel.


Image


Image

The finding details include:

  1. Severity:

Indicates the risk level of the vulnerability: Low, Medium, or High.

  1. CVE / CWE ID

Standard identifiers for tracking known vulnerabilities and weaknesses.

  1. Assigned Owner

The team member responsible for follow-up and coordination.

  1. Target & Assessment Reference

Shows which asset and assessment the finding relates to.

  1. Reported Date

The date when the vulnerability was discovered.

  1. Description

Explains the vulnerability, its potential impact, and how it can be exploited.

  1. Proof of Concept (PoC)

Step-by-step instructions demonstrating how the vulnerability can be reproduced.

  1. Remediation

Recommended steps to address the vulnerability, such as input validation, output encoding, or using security libraries.

  1. References

Optional external links or documentation related to the vulnerability.

  1. Discussion

Allows team members to collaborate, add comments, and track remediation progress.

Powered By SparrowDesk