How to Filter and Search Exposures
How to Filter and Search Exposures
Category: Exposures & Threats
The Exposures page lets you filter and search to find specific vulnerabilities quickly.
Available Filters
- Asset Type - Registered Domain, Subdomain, IP Address, Certificate
- Status - Exposed, Hijacked, Spoofed, Impersonated, Invalid, Prevented
- Exposure Type - The category of vulnerability
- Potential Impact - The business impact category
- Exposure Scenario - The specific scenario type
- Quick Search - Search by asset identifier or root cause identifier
Tips
- Active filter chips appear at the top of the exposure list. Click "Reset" to clear all filters.
- Use the Status filter to focus on critical items first (Hijacked, Impersonated).
- Combine filters to narrow down — for example, filter by "Subdomain Takeover" type and "Exposed" status to find actionable subdomain issues.
Exposure Detail View
Click on any exposure to open a sidebar with full details:
- Impact Tab - Business impact summary of what could happen if exploited
- Reasoning Tab - Exposure scenario, root cause, exploitability assessment, and attacker procedure
Updated on: 26/02/2026
Thank you!