Vulnerability Management Feature | Vulnerability type | Linux System | Windows System |
Vulnerability scans. Applicable to hosts of the Pro or Ultimate Edition | Linux software vulnerabilities | ✓ | - |
| Windows system patches | - | ✓ |
| Web-CMS vulnerabilities | ✓ | ✓ |
| Application vulnerabilities | ✓ | ✓ |
Vulnerability Defense Applicable to servers of the Ultimate Edition | Linux software vulnerabilities | - | - |
| Windows system patches | - | - |
| Web-CMS vulnerabilities | ✓ (Only some vulnerabilities are supported) | - |
| Application vulnerabilities | ✓ (Only some vulnerabilities are supported) | - |
Automatic Vulnerability Fixing Applicable to hosts of the Pro or Ultimate Edition | Linux software vulnerabilities | ✓ (Only some vulnerabilities are supported) | - |
| Windows system patches | - | ✓ |
| Web-CMS vulnerabilities | ✓ (Only some vulnerabilities are supported) | ✓ (Only some vulnerabilities are supported) |
| Application vulnerabilities | - | - |
Operating system | System Version | System Vulnerability | Application Vulnerability/Web-CMS Vulnerability |
CentOS | CentOS 5 | ✓ | ✓ |
| CentOS 6 | ✓ | ✓ |
| CentOS 7 | ✓ | ✓ |
| CentOS 8 | ✓ | ✓ |
Debian Note: Only vulnerability scanning is supported. Automatic vulnerability fixing is not supported. | Debian 8 | - | ✓ |
| Debian 9 | - | ✓ |
| Debian 10 | - | ✓ |
| Debian 11 | - | ✓ |
| Debian 12 | - | ✓ |
Windows Note: Only vulnerability scanning is supported. Automatic vulnerability fixing is not supported. | Windows Server 2008 | ✓ | ✓ |
| Windows Server 2012 | ✓ | ✓ |
| Windows Server 2016 | ✓ | ✓ |
| Windows Server 2019 | ✓ | ✓ |
| Windows Server 2022 | ✓ | ✓ |
Ubuntu | Ubuntu 16.04 | ✓ | ✓ |
| Ubuntu 18.04 | ✓ | ✓ |
| Ubuntu 20.04 | ✓ | ✓ |
| Ubuntu 21.04 | ✓ | ✓ |
| Ubuntu 22.04 | ✓ | ✓ |
| Ubuntu 24.04 | ✓ | ✓ |
Tlinux/TencentOS | Tlinux | - | ✓ |
RockyLinux | RockyLinux | - | ✓ |
OpenCloudOS | OpenCloudOS | - | ✓ |
Operating System Version | Official End of Support Date |
Windows Server 2003 | July 14, 2015 |
Windows Server 2008 | January 14, 2020 |
Windows Server 2008 R2 | January 14, 2020 |
Windows Server 2008 SP2 | January 14, 2020 |
Windows Server 2012 | October 10, 2023 |
Windows Server 2012 R2 | October 10, 2023 |
Ubuntu 12.04 LTS | April 28, 2017 |
Ubuntu 14.04 LTS | Apr-19 |
Ubuntu 16.04 LTS | 21-Apr |
Ubuntu 18.04 LTS | April 2023 |
CentOS 5 | March 31, 2017 |
CentOS 6 | November 30, 2020 |
CentOS 7 | June 30, 2024 |
CentOS 8 | December 31, 2021 |






Field Name | Field Description |
High-priority vulnerability fixes | This category displays popular attack vulnerabilities and critical/high-risk vulnerabilities, which need to be preferentially fixed. By default, it counts the number of vulnerabilities pending fixing. Click Custom Rule to perform custom rule judgment on high-priority vulnerabilities. |
All vulnerabilities | Total number of detected Linux software vulnerabilities, Windows system vulnerabilities, Web-CMS vulnerabilities, and application vulnerabilities. |
Affected Servers | Number of hosts with detected vulnerabilities. |
Network attack events (last 1 month) | Counts the number of network attack events in the last 1 month. |
Supported vulnerabilities | You can view the vulnerability database supported by CSC. You can search it up to 25 times per day, and a single search can display up to 100 results. |

Field Name | Field Description |
Vulnerability name/tag | Vulnerability name refers to the currently detected vulnerability, and Tag refers to the tag of the vulnerability (such as remote exploitation, service restart, existing EXP, and so on). |
Detection method | Version comparison, POC verification. |
Vulnerability Type | Linux software vulnerabilities, Windows system vulnerabilities, Web-CMS vulnerabilities, application vulnerabilities. |
Risk Level | Critical, High, Medium, Low. |
Global attack popularity | High, Medium, Low, No activity. |
CVSS | Refers to the score of the Common Vulnerability Scoring System, ranging from 0 to 10, where 0 represents the least severe and 10 represents the most severe. |
CVE Number | The unique identifier for the vulnerability in the Common Vulnerabilities and Exposures (CVE) database. |
Last scanned | The time when the vulnerability was last detected by scanning. |
Affected Servers | Number of hosts with the vulnerability. |
Processing Status | Pending, In Progress, Scanning, Fixed, Ignored, Fix Failed. |
Fix status | Not supported, Can be fixed automatically (no restart required), Can be fixed automatically (restart required). |
Operation | One-Click Fix: Some Linux software vulnerabilities and Web-CMS vulnerabilities can be fixed automatically. Click One-Click Fix to open the vulnerability details pop-up window. Then, select the hosts that require fixing. For details, see Vulnerability Automatic Fixing. More: Rescan (rescan the vulnerability); Ignore Vulnerability (ignore the vulnerability, and the host will no longer be scanned for this vulnerability in the future). |
피드백