Set up Jira Cloud
Learn how to set up Jira Cloud and integrate it with other products and applications.
Advanced search makes it easy for your team to find and track vulnerabilities across your issues. Add vulnerability properties to your Jira Query Language (JQL) queries to refine your issue search results. Learn more about using advanced search with JQL
You can search for vulnerabilities based on these properties:
vulnerability[status]
vulnerability[severity]
vulnerability[type]
vulnerability[provider]
vulnerability[totalCount]
vulnerability[lastUpdated]
vulnerability[introducedDate]
vulnerability[displayName]
vulnerability[identifiers]
vulnerability[additionalInfoContent]
For example, if you wanted to find all issues with a vulnerability, you would add vulnerability[totalCount] > 0 to your JQL query.
Syntax | vulnerability[status] |
---|---|
Field Type | TEXT |
Auto-complete | No |
Supported operators | =, !=, IN, NOT IN |
Unsupported operators | ~, !~, >, >=, <, <=, IS, IS NOT, WAS, WAS IN, WAS NOT, WAS NOT IN, CHANGED |
Supported values | OPEN, IGNORED, CLOSED, UNKNOWN |
Examples
vulnerability[status] = OPEN
Searches issues with ‘open’ vulnerabilities.
vulnerability[status] != CLOSED
Add an exclamation mark (!) to your query to search for issues that do not have vulnerabilities marked as ‘closed’.
vulnerability[status] IN ("IGNORED")
Searches issues with ‘ignored’ vulnerabilities.
vulnerability[status] NOT IN ("UNKNOWN")
Searches issues with ‘unknown’ vulnerabilities.
vulnerability[status] = "OPEN" AND Sprint NOT IN (openSprints(), futureSprints()) AND status != CLOSED
Extend your query to search for issues with vulnerabilities marked as "OPEN" that are still in the backlog.
Syntax | vulnerability[severity] |
---|---|
Field Type | TEXT |
Auto-complete | No |
Supported operators | =, !=, IN, NOT IN |
Unsupported operators | ~, !~, >, >=, <, <=, IS, IS NOT, WAS, WAS IN, WAS NOT, WAS NOT IN, CHANGED |
Supported values | CRITICAL, HIGH, MEDIUM, LOW |
Examples
vulnerability[severity] = CRITICAL
Searches issues with ‘critical’ severity vulnerabilities.
vulnerability[severity] = HIGH
Searches issues with ‘high’ severity vulnerabilities.
vulnerability[severity] = MEDIUM
Searches issues with ‘medium’ severity vulnerabilities.
vulnerability[severity] = LOW
Searches issues with 'low' severity vulnerabilities.
vulnerability[severity] IN ("CRITICAL", "HIGH") AND Sprint NOT IN (openSprints(), futureSprints()) AND status != CLOSED
Extend your query to search for ‘critical’ and ‘high’ severity vulnerabilities that are still in the backlog.
Syntax | vulnerability[type] |
---|---|
Field Type | TEXT |
Auto-complete | No |
Supported operators | =, !=, IN, NOT IN |
Unsupported operators | ~, !~, >, >=, <, <=, IS, IS NOT, WAS, WAS IN, WAS NOT, WAS NOT IN, CHANGED |
Examples
vulnerability[type] = SAST
Searches vulnerabilities identified through Static Application Security Testing (SAST).
vulnerability[type] = SCA
Searches vulnerabilities identified through Software Composition Analysis (SCA).
vulnerability[type] != DAST
Searches vulnerabilities not identified through Dynamic Application Security Testing (DAST).
Syntax | vulnerability[provider] |
---|---|
Field Type | TEXT |
Auto-complete | No. The latest 15 provider values will be displayed. |
Supported operators | =, !=, IN, NOT IN |
Unsupported operators | ~, !~, >, >=, <, <=, IS, IS NOT, WAS, WAS IN, WAS NOT, WAS NOT IN, CHANGED |
Examples
vulnerability[provider] = ‘snyk.in.jira’
Searches vulnerabilities by the provider 'snyk.in.jira'.
vulnerability[provider] IN ('snyk.in.jira', ‘stackhawk-jira-connect-app’)
Searches vulnerability entries by providers, either 'snyk.in.jira' or ‘stackhawk-jira-connect-app’.
Syntax | vulnerability[totalCount] |
---|---|
Field Type | NUMBER |
Auto-complete | No |
Supported operators | =, >, >=, <, <= |
Unsupported operators | ~, !~, !=, IN, NOT IN, IS, IS NOT, WAS, WAS IN, WAS NOT, WAS NOT IN, CHANGED |
Examples
vulnerability[totalCount] < 2
Searches issues that have less than 2 vulnerabilities.
vulnerability[totalCount] >= 2
Searches issues that have 2 or more vulnerabilities.
Syntax | vulnerability[lastUpdated] |
---|---|
Field Type | TEXT Valid formats:
|
Auto-complete | No |
Supported operators | >, >=, <, <= |
Unsupported operators | =, ~, !~, !=, IN, NOT IN, IS, IS NOT, WAS, WAS IN, WAS NOT, WAS NOT IN, CHANGED |
Examples
vulnerability[lastUpdated] >= -8h
Searches vulnerabilities that were updated within the last 8 hours.
vulnerability[lastUpdated] > "2024-01-01 00:00"
Searches vulnerabilities that were updated after 12:00 a.m. on January 1, 2024.
vulnerability[lastUpdated] >= "2023-12-01" and vulnerability[lastUpdated] <= "2023-12-31"
Searches vulnerabilities that were updated between December 1 to 31, 2023.
Syntax | vulnerability[introducedDate] |
---|---|
Field Type | TEXT Valid formats:
|
Auto-complete | No |
Supported operators | >, >=, <, <= |
Unsupported operators | =, ~, !~, !=, IN, NOT IN, IS, IS NOT, WAS, WAS IN, WAS NOT, WAS NOT IN, CHANGED |
Examples
vulnerability[introducedDate] >= -8h
Searches vulnerabilities that were introduced within the last 8 hours.
vulnerability[introducedDate] > "2023-12-01 00:00"
Searches vulnerabilities that were introduced after 12:00 a.m. on January 1, 2024.
vulnerability[introducedDate] >= "2023-12-01" and vulnerability[introducedDate] <= "2023-12-31"
Searches vulnerabilities that were introduced between December 1 to 31, 2023.
Syntax | vulnerability[displayName] |
---|---|
Field Type | TEXT |
Auto-complete | No |
Supported operators | =, != |
Unsupported operators | ~, !~, >, >=, <, <=, IN, NOT IN, IS, IS NOT, WAS, WAS IN, WAS NOT, WAS NOT IN, CHANGED |
Examples
vulnerability[displayName] = “Improper Input Validation”
Searches vulnerabilities with “Improper Input Validation” in their display name.
vulnerability[displayName] != “Cross-site Scripting (XSS)”
Searches vulnerabilities without “Cross-site Scripting (XSS)” in their display name.
Syntax | vulnerability[identifiers] |
---|---|
Field Type | TEXT |
Auto-complete | No |
Supported operators | =, IN |
Unsupported operators | ~, !~, >, >=, <, <=, !=, NOT IN, IS, IS NOT, WAS, WAS IN, WAS NOT, WAS NOT IN, CHANGED |
Examples
vulnerability[identifiers] = “SNYK-JS-IP-6240864”
Searches vulnerabilities with “SNYK-JS-IP-6240864” in their identifier.
vulnerability[identifiers] IN (“CWE-79”, “CWR-80”)
Searches vulnerabilities with “CWE-79” or “CWR-80” in their identifier.
Syntax | vulnerability[additionalInfoContent] |
---|---|
Field Type | TEXT |
Auto-complete | No |
Supported operators | =, != |
Unsupported operators | ~, !~, >, >=, <, <=, IN, NOT IN, IS, IS NOT, WAS, WAS IN, WAS NOT, WAS NOT IN, CHANGED |
Examples
vulnerability[additionalInfoContent] = “security-container-1”
Searches vulnerabilities with “security-container-1” in their additional information.
vulnerability[additionalInfoContent] != “security-container-2”
Searches vulnerabilities without “security-container-2” in their additional information.
Was this helpful?