Host Vulnerability
Table 1. Host vulnerability list parameters
Parameter | Description |
---|---|
Host IP | The IP address of the host, if there is no external IP, it will be displayed as an internal IP |
Vulnerability number | The unique number of the vulnerability |
Risk level | The risk level evaluated according to the risk type, including ‘high risk’, ‘medium risk’ and ‘low risk’ |
Application type | Which type of application is affected by this risk, such as ntp |
Version number | The version number of the impacted application |
Processing status | Indicates the processing status, including ‘not processed’ and ‘ignored’. If the risk has been treated, this risk information will be deleted in the next detection. |
Vulnerability Details
Show vulnerability description and suggestions on how to handle the vulnerability.
Ignore