Security Center detects and fixes Linux software vulnerabilities. This topic describes how to view and handle Linux software vulnerabilities.
Background information
View vulnerability information
View vulnerability details and handle vulnerabilities
Description of the details page
Parameter | Description |
---|---|
CVE ID | The Common Vulnerabilities and Exposures (CVE) ID of the vulnerability. The CVE system provides a reference method for publicly known information-security vulnerabilities and exposures. You can use CVE IDs, such as CVE-2018-1123, to filter relevant information about vulnerability fixes in CVE-compatible databases to resolve security issues. |
Impact | The value of the Impact parameter is a Common Vulnerability Scoring System (CVSS)
score. The CVSS score follows the widely accepted industry standard and is calculated
based on a formula that depends on several attributes of the vulnerability. This score
is used to determine the severity of the vulnerability.
The following list describes the severity rating scale in CVSS v3.0:
|
Affected Assets | The details of assets that are affected by the vulnerability, including the public and private IP addresses of the assets. |
Priority | The following list describes the vulnerability priorities:
|
Detail | On the Detail tab, find a vulnerability and click Details in the Actions column to view details of this vulnerability.
|