Docs
uhids
Operation Guide
Security Events
Host vulnerability

Host Vulnerability

Table 1. Host vulnerability list parameters

ParameterDescription
Host IPThe IP address of the host, if there is no external IP, it will be displayed as an internal IP
Vulnerability numberThe unique number of the vulnerability
Risk levelThe risk level evaluated according to the risk type, including ‘high risk’, ‘medium risk’ and ‘low risk’
Application typeWhich type of application is affected by this risk, such as ntp
Version numberThe version number of the impacted application
Processing statusIndicates the processing status, including ‘not processed’ and ‘ignored’. If the risk has been treated, this risk information will be deleted in the next detection.

Vulnerability Details

Show vulnerability description and suggestions on how to handle the vulnerability.

Note: Vulnerability repair is a high-risk operation, be sure to take risk avoidance measures and properly implement vulnerability repair!See here for how to fix vulnerabilities?

Ignore

Note: After clicking [Ignore] and confirming, this type of risk of this host IP will no longer be checked. And ignoring cannot be cancelled.