Skip to Content

Application Vulnerabilities

Table 1. Application Vulnerability List Parameters

ParameterDescription
Resource AddressThe host’s IP address. If there is no public IP, the internal IP and cloud resource ID are displayed.
Risk LevelThe risk level assessed based on the type of vulnerability, categorized as High, Medium, or Low.
Application NameThe affected application, e.g., ntp.
Process FileThe name of the currently running affected process.
Configuration FileThe path to the affected application’s configuration file.
Risk DescriptionA description of the detected security risk.
Remediation AdviceRecommendations for addressing the detected risk.
Discovery TimeThe timestamp when the security issue was first detected.
Update TimeThe most recent timestamp when the security issue was detected.
Handling StatusThe current status of the vulnerability, including Unprocessed and Ignored. Once a risk is addressed, it will be removed in the next detection cycle.

Vulnerability Details

This section displays the vulnerability description and remediation recommendations.

⚠️ Important Note:

Vulnerability remediation is a high-risk operation. Ensure proper risk mitigation measures before proceeding with the fix!

Ignore

⚠️ Warning:

Clicking [Ignore] and confirming will permanently disable detection of this risk type for the host’s IP.
This action is irreversible.