All Products
Search
Document Center

Application Real-Time Monitoring Service:View risky components

Last Updated:Mar 11, 2026

Third-party dependencies from public repositories such as Maven can introduce vulnerabilities with known Common Vulnerabilities and Exposures (CVE) entries. Application Real-Time Monitoring Service (ARMS) Application Security scans your applications to detect these risky components, giving you visibility into CVE severity, affected versions, and dependency paths so you can prioritize remediation.

From the Risky Components page, you can:

  • Identify third-party dependencies with known CVEs across all monitored applications

  • Assess vulnerability severity, scores, and affected component versions

  • Trace component paths to locate vulnerable dependencies in your dependency tree

  • Review a full inventory of all third-party components, including those without known vulnerabilities

Important

Risky components expose your application to potential attacks. Upgrade affected components as soon as possible. If an immediate upgrade is not feasible, set the prevention mode to Monitor and Block so that ARMS intercepts exploit attempts at runtime.

Prerequisites

Before you begin, make sure you have:

  • An application monitored by ARMS with Application Security enabled

  • Access to the ARMS console

Open the Risky Components page

  1. Log on to the ARMS console.

  2. In the left-side navigation pane, choose Application Security > Risky Component Detection.

  3. In the top navigation bar, select a region.

By default, the page displays vulnerability counts across all applications.

Risky component overview

Filter by application

To view risky components for a single application, use either method:

  • At the top of the Risky Components page, open the All Applications drop-down list and select an application.

  • In the left-side navigation pane, choose Application Security > Application List. Find the target application and click the number in the Risky Components column.

View vulnerability details

The Risky Component Detection tab lists all detected vulnerabilities. Each row contains the following fields:

ColumnDescription
CVE IDIdentifier in the Common Vulnerabilities and Exposures database. Use this to look up the vulnerability in public CVE databases for additional context.
Vulnerability severitySeverity rating (for example, Critical, High, Medium, or Low) based on the nature of the vulnerability.
Vulnerability scoreNumeric risk score that quantifies the severity. Higher scores indicate greater risk.
Component versionVersion of the affected third-party component.
Component pathFull dependency path that includes the vulnerable component, showing how the dependency is introduced into your application.

Filter vulnerabilities

Narrow down results by filtering on any combination of:

  • Component path -- Locate vulnerabilities in a specific dependency chain.

  • CVE ID -- Search for a specific vulnerability.

  • Vulnerability severity -- Focus on the most severe vulnerabilities first.

Inspect a specific vulnerability

Click View in the Details column to open a detail panel. The panel contains:

  • Full vulnerability details, including the CVE description

  • Affected components and their versions

  • Application instances running the vulnerable component

View all third-party components

The Risky Component Detection tab only lists components with known CVEs. To see every third-party component in your applications, switch to the Full Component Auto-detection tab.

Full component auto-detection

Use this tab for proactive security management. For example, when a new vulnerability is publicly disclosed, search the full component list to determine whether your applications include the affected component -- before it appears on the Risky Component Detection tab.

Remediation guidance

Address risky components in order of severity. The following table summarizes the recommended approach:

ActionWhen to useDetails
Upgrade the componentA patched version is available (recommended)Check the CVE entry for the fixed version. Update the dependency in your project configuration (for example, pom.xml for Maven) and redeploy. For transitive dependencies, upgrade the direct dependency that introduces the vulnerable component.
Enable runtime protectionAn upgrade is not immediately feasibleSet the prevention mode to Monitor and Block in ARMS. This intercepts exploit attempts targeting the vulnerability at runtime, providing a temporary safeguard while you plan the upgrade.
Monitor the full component inventoryOngoing practiceRegularly review the Full Component Auto-detection tab. When a new CVE is disclosed, search the inventory to determine exposure before the vulnerability appears on the Risky Component Detection tab.