Report ID2
View Created On:Jan 1, 1970 00:00 GMT
Host Address(es):
Report Contents
1. Risk Classification Summary
2. Vulnerability Category Summary
3. Vulnerability Title Summary
4. Vulnerability Details
5. Open Ports
Appendix A: Risk Definitions
1. Risk Classification Summary
Vulnerabilities are classified according to the risk they present to the network/host on which they are found. The following chart summarizes how the different issues we found are spread across the different risk classes. For a detailed explanation of how vulnerabilities are classified, see Appendix A: Risk Definitions
0,0,0,0
2. Vulnerability Category Summary
The vulnerability category summary shows how the various issues that were reported are distributed across the different test categories.

CategoryHigh  Med  Low  Other  
Fedora Local Security Checks     
Web application abuses     
Debian Local Security Checks     
Ubuntu Local Security Checks     
General     
CentOS Local Security Checks     
SuSE Local Security Checks     
Red Hat Local Security Checks     
Huawei EulerOS Local Security Checks     
Mandrake Local Security Checks     
Product detection     
Windows : Microsoft Bulletins     
Gentoo Local Security Checks     
FreeBSD Local Security Checks     
Oracle Linux Local Security Checks     
Denial of Service     
CGI abuses     
Amazon Linux Local Security Checks     
CISCO     
Databases     
Buffer overflow     
Slackware Local Security Checks     
Web Servers     
Windows     
Conectiva Local Security Checks     
Backdoors     
Mageia Linux Local Security Checks     
Turbolinux Local Security Tests     
Service detection     
Default Accounts     
FTP     
Mac OS X Local Security Checks     
Gain a shell remotely     
Policy     
Nmap NSE net     
IT-Grundschutz     
Trustix Local Security Checks     
Nmap NSE     
JunOS Local Security Checks     
F5 Local Security Checks     
Gain root remotely     
Remote file access     
SMTP problems     
IT-Grundschutz-11     
Misc.     
IT-Grundschutz-10     
IT-Grundschutz-13     
IT-Grundschutz-12     
IT-Grundschutz-15     
AIX Local Security Checks     
CGI abuses : XSS     
Privilege escalation     
SSL and TLS     
VMware Local Security Checks     
RPC     
Malware     
Palo Alto PAN-OS Local Security Checks     
FortiOS Local Security Checks     
Firewalls     
Citrix Xenserver Local Security Checks     
Peer-To-Peer File Sharing     
Windows : User management     
SNMP     
Useless services     
Finger abuses     
HP-UX Local Security Checks     
Brute force attacks     
Settings     
Port scanners     
Huawei     
Netware     
Compliance     
Credentials     
NIS     
Solaris Local Security Checks     
Totals:0  0  0  0  

3. Vulnerability Title Summary
4. Vulnerability Details
5. Open Ports -
Number of open ports found by port scan:-1
 
Appendix A: Risk Definitions
Users should note that test classifications are subjective, although we do our best to make appropriate classifications. If you spot an inconsistency, please let us know so that we can make the appropriate corrections.

AppendixB: CVE Versioning
CVE identifiers, an industry standard way of identifying tests, are maintained by Mitre. The current mapping of CVE/CAN identifiers to Test IDs is based on CVE Version Number 20200415, and CAN Version Number 20200415. These were verified on April 15, 2020 as being the latest available.