Application Vulnerabilities
Table 1. Application Vulnerability List Parameters
Parameter | Description |
---|---|
Resource Address | The host’s IP address. If there is no public IP, the internal IP and cloud resource ID are displayed. |
Risk Level | The risk level assessed based on the type of vulnerability, categorized as High, Medium, or Low. |
Application Name | The affected application, e.g., ntp . |
Process File | The name of the currently running affected process. |
Configuration File | The path to the affected application’s configuration file. |
Risk Description | A description of the detected security risk. |
Remediation Advice | Recommendations for addressing the detected risk. |
Discovery Time | The timestamp when the security issue was first detected. |
Update Time | The most recent timestamp when the security issue was detected. |
Handling Status | The current status of the vulnerability, including Unprocessed and Ignored. Once a risk is addressed, it will be removed in the next detection cycle. |
Vulnerability Details
This section displays the vulnerability description and remediation recommendations.
⚠️ Important Note:
Vulnerability remediation is a high-risk operation. Ensure proper risk mitigation measures before proceeding with the fix!
Ignore
⚠️ Warning:
Clicking [Ignore] and confirming will permanently disable detection of this risk type for the host’s IP.
This action is irreversible.