You should look at the vulnerability flow (to the right of the screen when you view the vulnerability) and see what objects are involved in ...
確定! 回上一頁