Hosts Scanned

Successfully Scanned Hosts (IP)

81.143.222.156-81.143.222.157

Target distribution across scanner appliances

External : 81.143.222.156-81.143.222.157

Options Profile

DEFAULT_VM_OPTIONS_PROFILE_2022
Scan Settings
 
Ports
-
Scanned TCP Ports
Standard Scan and Additional TCP Ports: 8080, 8081, 8082, 8083, 8084, 8085, 8090, 50000, 50001, 50003, 33848
Scanned UDP Ports
Standard Scan and Additional UDP Ports: 8080, 8081, 8082, 8083, 8084, 8085, 8090, 50000, 50001, 50002, 33848
Scan Dead Hosts
Off
Close Vulnerabilities on Dead Hosts Count
2
Purge old host data when OS changes
On
Load Balancer Detection
On
Perform 3-way Handshake
Off
Vulnerability Detection
Complete
Intrusive Checks
Excluded
Password Brute Forcing
-
System
Disabled
Custom
Disabled
Authentication
-
Windows
Enabled
Unix/Cisco/Network SSH
Enabled
Unix Least Privilege Authentication
Disabled
Oracle
Disabled
Oracle Listener
Disabled
SNMP
Enabled
VMware
Enabled
DB2
Disabled
HTTP
Enabled
MySQL
Disabled
Tomcat Server
Disabled
MongoDB
Disabled
Palo Alto Networks Firewall
Disabled
Jboss Server
Disabled
Oracle WebLogic Server
Disabled
MariaDB
Disabled
InformixDB
Disabled
MS Exchange Server
Disabled
Oracle HTTP Server
Disabled
MS SharePoint
Disabled
Sybase
Disabled
Kubernetes
Disabled
SAP IQ
Disabled
SAP HANA
Disabled
Azure MS SQL
Disabled
Neo4j
Disabled
NGINX
Disabled
Infoblox
Disabled
Overall Performance
Normal
Allow Parallel Scanning
Disabled
Additional Certificate Detection
Disabled
Authenticated Scan Certificate Discovery
Disabled
Test Authentication
Disabled
Hosts to Scan in Parallel
-
Use Appliance Parallel ML Scaling
Off
External Scanners
15
Scanner Appliances
30
Processes to Run in Parallel
-
Total Processes
10
HTTP Processes
10
Packet (Burst) Delay
Medium
Port Scanning and Host Discovery
-
Intensity
Normal
Dissolvable Agent
-
Dissolvable Agent (for this profile)
Disabled
Windows Share Enumeration
Disabled
Windows Directory Search
Disabled
Lite OS Discovery
Disabled
User Defined HTTP Header
ORG_Vuln_Mgmt
Host Alive Testing
Disabled
Do Not Overwrite OS
Disabled
System Authentication
 
System Authentication Records
-
Include system created authentication records in scans
Disabled
Advanced Settings
 
Host Discovery
TCP Custom TCP Port List: 21-23, 25, 53, 80, 88, 110-111, 135, 139, 443, 445, 1433, 1521, 1525, 1526, 1527, 1529, 1571
 
UDP Standard Scan
 
ICMP On
Packet Options
-
Ignore firewall-generated TCP RST packets
On
Ignore all TCP RST packets
Off
Ignore firewall-generated TCP SYN-ACK packets
On
Do not send TCP ACK or SYN-ACK packets during host discovery
Off

Report Legend

Vulnerability Levels

A Vulnerability is a design flaw or mis-configuration which makes your network (or a host on your network) susceptible to malicious attacks from local or remote users. Vulnerabilities can exist in several areas of your network, such as in your firewalls, FTP servers, Web servers, operating systems or CGI bins. Depending on the level of the security risk, the successful exploitation of a vulnerability can vary from the disclosure of information about the host to a complete compromise of the host.

Severity Level Description
1
Minimal Intruders can collect information about the host (open ports, services, etc.) and may be able to use this information to find other vulnerabilities.
2
Medium Intruders may be able to collect sensitive information from the host, such as the precise version of software installed. With this information, intruders can easily exploit known vulnerabilities specific to software versions.
3
Serious Intruders may be able to gain access to specific information stored on the host, including security settings. This could result in potential misuse of the host by intruders. For example, vulnerabilities at this level may include partial disclosure of file contents, access to certain files on the host, directory browsing, disclosure of filtering rules and security mechanisms, denial of service attacks, and unauthorized use of services, such as mail-relaying.
4
Critical Intruders can possibly gain control of the host, or there may be potential leakage of highly sensitive information. For example, vulnerabilities at this level may include full read access to files, potential backdoors, or a listing of all the users on the host.
5
Urgent Intruders can easily gain control of the host, which can lead to the compromise of your entire network security. For example, vulnerabilities at this level may include full read and write access to files, remote execution of commands, and the presence of backdoors.

Potential Vulnerability Levels

A potential vulnerability is one which we cannot confirm exists. The only way to verify the existence of such vulnerabilities on your network would be to perform an intrusive scan, which could result in a denial of service. This is strictly against our policy. Instead, we urge you to investigate these potential vulnerabilities further.

Severity Level Description
1
Minimal If this vulnerability exists on your system, intruders can collect information about the host (open ports, services, etc.) and may be able to use this information to find other vulnerabilities.
2
Medium If this vulnerability exists on your system, intruders may be able to collect sensitive information from the host, such as the precise version of software installed. With this information, intruders can easily exploit known vulnerabilities specific to software versions.
3
Serious If this vulnerability exists on your system, intruders may be able to gain access to specific information stored on the host, including security settings. This could result in potential misuse of the host by intruders. For example, vulnerabilities at this level may include partial disclosure of file contents, access to certain files on the host, directory browsing, disclosure of filtering rules and security mechanisms, denial of service attacks, and unauthorized use of services, such as mail-relaying.
4
Critical If this vulnerability exists on your system, intruders can possibly gain control of the host, or there may be potential leakage of highly sensitive information. For example, vulnerabilities at this level may include full read access to files, potential backdoors, or a listing of all the users on the host.
5
Urgent If this vulnerability exists on your system, intruders can easily gain control of the host, which can lead to the compromise of your entire network security. For example, vulnerabilities at this level may include full read and write access to files, remote execution of commands, and the presence of backdoors.

Information Gathered

Information Gathered includes visible information about the network related to the host, such as traceroute information, Internet Service Provider (ISP), or a list of reachable hosts. Information Gathered severity levels also include Network Mapping data, such as detected firewalls, SMTP banners, or a list of open TCP services.

Severity Level Description
1
Minimal Intruders may be able to retrieve sensitive information related to the host, such as open UDP and TCP services lists, and detection of firewalls.
2
Medium Intruders may be able to determine the operating system running on the host, and view banner versions.
3
Serious Intruders may be able to detect highly sensitive data, such as global system user lists.