Documen 2 T
Documen 2 T
Documen 2 T
October 3, 2023
Report
prepared by
HostedScan Security
hostedscan.com
HostedScan Security Vulnerability Scan Report
Overview
1 Executive Summary 3
2 Risks By Target 4
3 Open TCP Ports 6
4 Glossary 18
hostedscan.com 2
Executive Summary Vulnerability Scan Report
1 Executive Summary
Vulnerability scans were conducted on selected servers, networks, websites, and applications. This report
contains the discovered potential risks from these scans. Risks have been classified into categories according
to the level of threat and degree of potential harm they may pose.
0
Critical
0High
9
Medium
2
Low
0
Accepted
82% 18%
Vulnerability Categories
11
Open TCP Ports
hostedscan.com 3
Risks By Target Vulnerability Scan Report
2 Risks By Target
This section contains the vulnerability findings for each target that was scanned. Prioritize the most
vulnerable assets first.
hostedscan.com 4
Risks By Target | gintic.com.co Vulnerability Scan Report
Target
gintic.com.co
Total Risks
0 0 9 2 0
82% 18%
hostedscan.com 5
Open TCP Ports Vulnerability Scan Report
0
Critical
0High
9
Medium
2
Low
0
Accepted
82% 18%
hostedscan.com 6
Open TCP Ports | Open TCP Port: 21 Vulnerability Scan Report
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.
hostedscan.com 7
Open TCP Ports | Open TCP Port: 110 Vulnerability Scan Report
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.
hostedscan.com 8
Open TCP Ports | Open TCP Port: 143 Vulnerability Scan Report
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.
hostedscan.com 9
Open TCP Ports | Open TCP Port: 995 Vulnerability Scan Report
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.
hostedscan.com 10
Open TCP Ports | Open TCP Port: 993 Vulnerability Scan Report
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.
hostedscan.com 11
Open TCP Ports | Open TCP Port: 3306 Vulnerability Scan Report
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.
hostedscan.com 12
Open TCP Ports | Open TCP Port: 2525 Vulnerability Scan Report
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.
hostedscan.com 13
Open TCP Ports | Open TCP Port: 5432 Vulnerability Scan Report
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.
hostedscan.com 14
Open TCP Ports | Open TCP Port: 18765 Vulnerability Scan Report
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.
hostedscan.com 15
Open TCP Ports | Open TCP Port: 443 Vulnerability Scan Report
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.
hostedscan.com 16
Open TCP Ports | Open TCP Port: 80 Vulnerability Scan Report
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.
hostedscan.com 17
Glossary Vulnerability Scan Report
4 Glossary
Accepted Risk Open TCP Ports
An accepted risk is one which has been manually The NMAP TCP port scan discovers open TCP ports with a
reviewed and classified as acceptable to not fix at this complete scan of ports 0 to 65535.
time, such as a false positive or an intentional part of the
system's architecture. Risk
Fully Qualified Domain Name (FQDN) A risk is a finding from a vulnerability scan. Each risk is a
potential security issue that needs review. Risks are
A fully qualified domain name is a complete domain name assigned a threat level which represents the potential
for a specific website or service on the internet. This severity.
includes not only the website or service name, but also the
top-level domain name, such as .com, .org, .net, etc. For Target
example, 'www.example.com' is an FQDN. A target represents target is a single URL, IP address, or
fully qualified domain name (FQDN) that was scanned.
Threat Level
The threat level represents the estimated potential
severity of a particular risk. Threat level is divided into 4
categories: High, Medium, Low and Accepted.
Threat Level
The threat level represents the estimated potential
severity of a particular risk. Threat level is divided into 5
categories: Critical, High, Medium, Low and Accepted.
CVSS Score
The CVSS 3.0 score is a global standard for evaluating
vulnerabilities with a 0 to 10 scale. CVSS maps to threat
levels: 0.1 - 3.9 = Low, 4.0 - 6.9 = Medium, 7.0 - 8.9 =
High, 9.0 - 10.0 = Critical
hostedscan.com 18
This report was prepared using
HostedScan Security ®
For more information, visit hostedscan.com
Founded in Seattle, Washington in 2019, HostedScan, LLC. is
dedicated to making continuous vulnerability scanning and risk
management much more easily accessible to more businesses.
HostedScan, LLC.
2212 Queen Anne Ave N
Suite #521 Terms & Policies
Seattle, WA 98109 hello@hostedscan.com
hostedscan.com 19