Articles on: Exposures & Threats

How to Filter and Search Exposures

How to Filter and Search Exposures



Category: Exposures & Threats



The Exposures page lets you filter and search to find specific vulnerabilities quickly.



Available Filters



  • Asset Type - Registered Domain, Subdomain, IP Address, Certificate
  • Status - Exposed, Hijacked, Spoofed, Impersonated, Invalid, Prevented
  • Exposure Type - The category of vulnerability
  • Potential Impact - The business impact category
  • Exposure Scenario - The specific scenario type
  • Quick Search - Search by asset identifier or root cause identifier



Tips



  • Active filter chips appear at the top of the exposure list. Click "Reset" to clear all filters.
  • Use the Status filter to focus on critical items first (Hijacked, Impersonated).
  • Combine filters to narrow down — for example, filter by "Subdomain Takeover" type and "Exposed" status to find actionable subdomain issues.



Exposure Detail View



Click on any exposure to open a sidebar with full details:



  • Impact Tab - Business impact summary of what could happen if exploited
  • Reasoning Tab - Exposure scenario, root cause, exploitability assessment, and attacker procedure

Updated on: 26/02/2026

Was this article helpful?

Share your feedback

Cancel

Thank you!