1. Vulnerabilities
WatchDog Security Help Center
Admin Guide
  • Docs Home
  • Admin Guide
  • User Guide
  • MSP Guide
  • Getting Started
  • Create Your Free Organization
  • Domain Reservation
  • Company Management
    • Manage Branding
    • Delete Organization
  • Notification Center
    • Organization Events
    • User Events
    • Configure Notification Settings
    • User Notification Override
  • Posture Management
    • View Integrations
    • Configure Automated Integrations
    • Manage Automated Monitors
    • Configure Manual Integrations
    • Manage Manual Monitors
  • WatchDog University
    • Assigning Courses using WatchDog University
    • Auditing Course Completion
    • Downloading a Certificate of Completion
  • Policy Management
    • Create Policy
    • Publish Policy
    • Track Policy Acceptance
    • Send Policy Reminder
    • Update Policy
    • Download Policy Version
    • Delete Policy
    • Retire Policy
  • Risk Management
    • Perform A Risk Assessment
    • View and Manage Risks in Risk Register
    • Create Manual Risk
    • Edit and Manage Risk
    • Manage Risk Tasks
    • Manage Risk Lifecycle
  • Vendor Management
    • Add Vendor
    • Track Security Events
    • Manage Vendor Documents
    • Perform Vendor Assessments
    • Classify Vendor Risk
  • Inventory
    • Add Inventory Item
    • Update Inventory Item
    • Auto Populate Inventory
  • Compliance Center
    • Add Compliance Framework
    • Edit Compliance Framework
    • Assigning Control Owners
    • Pause Monitors and Documents
    • Manage Compliance Documents
    • Schedule Audit
    • Automated Monitoring
    • Cross-Framework Reuse
    • Progress Tracking
  • Trust Center
    • Customize Trust Center
    • Manage Trust Center Access
    • Monitor Access Activity (Events)
    • Custom Domain Setup
  • Vulnerabilities
    • Centralized Vulnerability Tracking
    • Import Vulnerabilities
    • Create Manual Vulnerabilities
    • Assign And Collaborate On Vulnerabilities
    • Configure Time To Remediate (TTR)
  • Control Panel
    • Manage Support Access
    • Phishing Campaigns
      • Creating an Allowlist for Phishing Simulations in Microsoft 365
      • Configure Google Workspace Allowlist for Phishing Simulations
  • User Management
    • Add Users
    • Configure Directory Sync
    • Manage User Access
    • Assign Licenses
    • Manage Invites And Users
    • Change Account Owner
    • Reset 2FA
  • Integrations
  1. Vulnerabilities

Import Vulnerabilities

Import vulnerability reports from external scanning tools into WatchDog Security. This allows you to centralize findings from tools such as Burp Suite, Nessus, and ZAP.
Who can use this feature?
All Account Owners and Security Admins
Available on the Free, Core and Business plans

Import Vulnerability Report#

1
Sign in to WatchDog Security
Sign in to the WatchDog Security Platform.
2
Open Vulnerabilities Page
Navigate to the Vulnerabilities page from the sidebar.
3
Start Import
Click Add Vulnerability and select Import.
4
Select Report Type
Choose the report type such as Burp Suite, Nessus, or ZAP.
5
Upload Report File
Drag and drop or upload the vulnerability report file in the supported format.
6
Import Vulnerabilities
Click Import to process and create vulnerabilities.

What Happens Next#

The uploaded report is parsed and converted into individual vulnerabilities.
Each vulnerability is assigned a severity based on the report data.
Imported findings appear in the Open Vulnerabilities table.

Troubleshooting#

Import File Not Accepted
If the file cannot be uploaded:
Ensure the file format matches supported types (.xml for supported tools)
Verify the file is exported correctly from the source tool
Check file size limits
Invalid formats will be rejected during upload
Import Fails Or No Data
Incorrect Severity Mapping
Modified at 2026-03-18 20:05:00
Previous
Centralized Vulnerability Tracking
Next
Create Manual Vulnerabilities
Built with