Scanning Vulnerability Repote
Scanning Vulnerability Repote
Scanning Vulnerability Repote
Vulnerability Scan
Report
prepared by
HostedScan Security
hostedscan.com
HostedScan Security Vulnerability Scan Report
Overview
1 Executive Summary 3
2 Risks By Target 4
4 Glossary 11
hostedscan.com 2
Executive Summary Vulnerability Scan Report
1 Executive Summary
Vulnerability scans were conducted on selected servers, networks, websites, and applications. This report contains
the discovered potential risks from these scans. Risks have been classified into categories according to the level of
threat and degree of potential harm they may pose.
0 0 2 2 0
50% 50%
Vulnerability Categories
4
Open TCP Ports
hostedscan.com 3
Risks By Target Vulnerability Scan Report
2 Risks By Target
This section contains the vulnerability findings for each target that was scanned. Prioritize the most vulnerable assets
first.
https://app.budgetbuddie.com/ 0 0 2 2 0
hostedscan.com 4
Risks By Target | https://app.budgetbuddie.com/ Vulnerability Scan Report
Target
https://app.budgetbuddie.com/
Total Risks
0 0 2 2 0
50% 50%
hostedscan.com 5
Open TCP Ports Vulnerability Scan Report
0 0 2 2 0
50% 50%
hostedscan.com 6
Open TCP Ports | Open TCP Port: 22 Vulnerability Scan Report
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443 to
serve websites over https. For a list of commonly used ports see https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be dangerous
when expected services are out of date and exploited through security vulnerabilities.
hostedscan.com 7
Open TCP Ports | Open TCP Port: 5010 Vulnerability Scan Report
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443 to
serve websites over https. For a list of commonly used ports see https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be dangerous
when expected services are out of date and exploited through security vulnerabilities.
hostedscan.com 8
Open TCP Ports | Open TCP Port: 443 Vulnerability Scan Report
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443 to
serve websites over https. For a list of commonly used ports see https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be dangerous
when expected services are out of date and exploited through security vulnerabilities.
hostedscan.com 9
Open TCP Ports | Open TCP Port: 80 Vulnerability Scan Report
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443 to
serve websites over https. For a list of commonly used ports see https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be dangerous
when expected services are out of date and exploited through security vulnerabilities.
hostedscan.com 10
Glossary Vulnerability Scan Report
4 Glossary
Accepted Risk Open TCP Ports
An accepted risk is one which has been manually The NMAP TCP port scan discovers open TCP ports with a
reviewed and classified as acceptable to not fix at this complete scan of ports 0 to 65535.
time, such as a false positive or an intentional part of the
system's architecture. Risk
A risk is a finding from a vulnerability scan. Each risk is a
Fully Qualified Domain Name (FQDN)
potential security issue that needs review. Risks are
A fully qualified domain name is a complete domain name assigned a threat level which represents the potential
for a specific website or service on the internet. This severity.
includes not only the website or service name, but also the
top-level domain name, such as .com, .org, .net, etc. For Target
example, 'www.example.com' is an FQDN.
A target represents target is a single URL, IP address, or
fully qualified domain name (FQDN) that was scanned.
Threat Level
The threat level represents the estimated potential severity
of a particular risk. Threat level is divided into 4
categories: High, Medium, Low and Accepted.
Threat Level
The threat level represents the estimated potential severity
of a particular risk. Threat level is divided into 5
categories: Critical, High, Medium, Low and Accepted.
CVSS Score
The CVSS 3.0 score is a global standard for evaluating
vulnerabilities with a 0 to 10 scale. CVSS maps to threat
levels: 0.1 - 3.9 = Low, 4.0 - 6.9 = Medium, 7.0 - 8.9 =
High, 9.0 - 10.0 = Critical
hostedscan.com 11
This report was prepared using
HostedScan Security ®
For more information, visit hostedscan.com
HostedScan, LLC.
hostedscan.com 12