Searching All Projects for a Security Vulnerability Advisory
FlexNet Code Insight 2019 R1
You might find it sometimes necessary to quickly see how a specific security vulnerability impacts your organization. You can search the system for a security vulnerability or advisory in one of the following ways:
|
•
|
If you know the exact ID of the security vulnerability or advisory—Use the Security Vulnerability search filter with the exact security vulnerability ID as the search criterion, as described in this section. |
Search Rules
When you use the Security Vulnerability search filter to search projects associated with a specific security vulnerability, the following rules apply:
|
•
|
Only one vulnerability ID can be specified as a search criterion. |
|
•
|
Only exact matches of the full vulnerability ID string are supported. Partial strings are not supported. |
|
•
|
The string you enter does not support spaces. |
|
•
|
Only published inventory items are searched. |
|
•
|
The search does not validate the vulnerability ID you enter. If you enter an invalid ID, no results are returned in the Projects list. |
Searching for a Security Vulnerability
Use this procedure to locate projects by the exact security vulnerability ID you specify.
To search for projects affected by a specific security vulnerability, do the following:
|
2.
|
At the top of the list, select Security Vulnerability from search dropdown on the left. |
|
3.
|
In the Enter Vulnerability ID field, specify the complete ID of the vulnerability (for example, CVE-2018-11776 for an NVD vulnerability, SA40575 for a Secunia advisory, DSA-4315 for a Debian advisory, and so forth). |
|
4.
|
Press Enter. The list of projects changes to reflect the search results, and a filtered count (for example, “(19 of 123)”) is also provided in the Projects list header to show the number of projects returned by the search. |
If no inventory items meet the specified criterion, the Projects list shows “No Projects”.
|
5.
|
Open one of the projects to see a filtered list of inventory items that are impacted by the security vulnerability. (See Opening a Project for details.) |
Open topic with navigation