Skip to Content

Web Vulnerabilities

Table 1. Web Vulnerability List Parameters

ParameterDescription
Resource AddressThe IP address of the host. If there is no external IP, the internal IP or cloud resource ID is displayed.
Risk LevelThe risk level assessed based on the type of risk, including “High”, “Medium”, and “Low”.
Application NameThe application affected by the risk, for example: Wordpress.
Risk DescriptionA description of the current affected security risk.
Handling AdviceThe suggested solution for handling the current risk.
Discovery TimeThe first time the security risk was discovered.
Update TimeThe last time the security risk was discovered.
Handling StatusIndicates the status of handling, including “Not Handled” and “Ignored.” If the risk has been handled, it will be deleted in the next detection.

Vulnerability Details

Displays the description of the vulnerability and advice on how to handle it.

Note: Fixing vulnerabilities is a high-risk operation. Make sure to take precautions and implement the fixes properly!

Ignore

Note: After clicking [Ignore] and confirming, this risk type for the host IP will no longer be checked, and it cannot be undone.