Application Vulnerabilities
Table 1. Application Vulnerability List Parameters
| Parameter | Description |
|---|---|
| Resource Address | The host’s IP address. If there is no public IP, the internal IP and cloud resource ID are displayed. |
| Risk Level | The risk level assessed based on the type of vulnerability, categorized as High, Medium, or Low. |
| Application Name | The affected application, e.g., ntp. |
| Process File | The name of the currently running affected process. |
| Configuration File | The path to the affected application’s configuration file. |
| Risk Description | A description of the detected security risk. |
| Remediation Advice | Recommendations for addressing the detected risk. |
| Discovery Time | The timestamp when the security issue was first detected. |
| Update Time | The most recent timestamp when the security issue was detected. |
| Handling Status | The current status of the vulnerability, including Unprocessed and Ignored. Once a risk is addressed, it will be removed in the next detection cycle. |
Vulnerability Details
This section displays the vulnerability description and remediation recommendations.
⚠️ Important Note:
Vulnerability remediation is a high-risk operation. Ensure proper risk mitigation measures before proceeding with the fix!
Ignore
⚠️ Warning:
Clicking [Ignore] and confirming will permanently disable detection of this risk type for the host’s IP.
This action is irreversible.