NMap Report
NMap Report
Vulnerability Scan
Report
Prepared By
HostedScan Security
hostedscan.com
HostedScan Security Vulnerability Scan Report
Overview
1 Executive Summary 3
2 Vulnerabilities By Target 4
4 Glossary 9
hostedscan.com 2
Executive Summary Vulnerability Scan Report
1 Executive Summary
Vulnerability scans were conducted on select servers, networks, websites, and applications. This report contains the
discovered potential vulnerabilities from these scans. Vulnerabilities have been classified by severity. Higher severity
indicates a greater risk of a data breach, loss of integrity, or availability of the targets.
0 0 0 2 0
100%
Vulnerability Categories
2
Open TCP Ports
hostedscan.com 3
Vulnerabilities By Target Vulnerability Scan Report
2 Vulnerabilities By Target
This section contains the vulnerability findings for each scanned target. Prioritization should be given to the
targets with the highest severity vulnerabilities. However, it is important to take into account the purpose of each
system and consider the potential impact a breach or an outage would have for the particular target.
https://www.glamourbook.com/ 0 0 0 2 0
hostedscan.com 4
Vulnerabilities By Target | https://www.glamourbook.com/ Vulnerability Scan Report
https://www.glamourbook.com/
Total Risks
0 0 0 2 0
100%
hostedscan.com 5
Open TCP Ports Vulnerability Scan Report
0 0 0 2 0
100%
hostedscan.com 6
Open TCP Ports | Open TCP Port: 443 Vulnerability Scan Report
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443 to
serve websites over https. For a list of commonly used ports see https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be dangerous
when expected services are out of date and exploited through security vulnerabilities.
hostedscan.com 7
Open TCP Ports | Open TCP Port: 80 Vulnerability Scan Report
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443 to
serve websites over https. For a list of commonly used ports see https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be dangerous
when expected services are out of date and exploited through security vulnerabilities.
hostedscan.com 8
Glossary Vulnerability Scan Report
4 Glossary
Accepted Vulnerability Open TCP Ports
An accepted vulnerability is one which has been manually The NMAP TCP port scan discovers open TCP ports with a
reviewed and classified as acceptable to not fix at this complete scan of ports 0 to 65535.
time, such as a false positive scan result or an intentional
part of the system's architecture. Vulnerability
A weakness in the computational logic (e.g., code) found
Fully Qualified Domain Name (FQDN) in software and hardware components that, when
A fully qualified domain name is a complete domain name exploited, results in a negative impact to confidentiality,
for a specific website or service on the internet. This integrity, or availability. Mitigation of the vulnerabilities in
includes not only the website or service name, but also the this context typically involves coding changes, but could
top-level domain name, such as .com, .org, .net, etc. For also include specification changes or even specification
example, 'www.example.com' is an FQDN. deprecations (e.g., removal of affected protocols or
functionality in their entirety).
Target
A target represents target is a single URL, IP address, or
fully qualified domain name (FQDN) that was scanned.
Severity
Severity represents the estimated impact potential of a
particular vulnerability. Severity is divided into 5
categories: Critical, High, Medium, Low and Accepted.
CVSS Score
The CVSS 3.0 score is a global standard for evaluating
vulnerabilities with a 0 to 10 scale. CVSS maps to threat
levels:
0.1 - 3.9 = Low
4.0 - 6.9 = Medium
7.0 - 8.9 = High
9.0 - 10.0 = Critical
hostedscan.com 9
This report was prepared using
HostedScan Security ®
For more information, visit hostedscan.com
Founded in Seattle, Washington in 2019, HostedScan, LLC. is
dedicated to making continuous vulnerability scanning and risk
management much more easily accessible to more businesses.
HostedScan, LLC.
2212 Queen Anne Ave N
Suite #521 Terms & Policies
Seattle, WA 98109 [email protected]
hostedscan.com 10