0% found this document useful (0 votes)
25 views10 pages

NMap Report

Report of NMap test

Uploaded by

emailpraveenin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views10 pages

NMap Report

Report of NMap test

Uploaded by

emailpraveenin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

February 17, 2025

Vulnerability Scan
Report
Prepared By
HostedScan Security

hostedscan.com
HostedScan Security Vulnerability Scan Report

Overview
1 Executive Summary 3

2 Vulnerabilities By Target 4

3 Open TCP Ports 6

4 Glossary 9

hostedscan.com 2
Executive Summary Vulnerability Scan Report

1 Executive Summary
Vulnerability scans were conducted on select servers, networks, websites, and applications. This report contains the
discovered potential vulnerabilities from these scans. Vulnerabilities have been classified by severity. Higher severity
indicates a greater risk of a data breach, loss of integrity, or availability of the targets.

1.1 Total Vulnerabilities


Below are the total number of vulnerabilities found by severity. Critical vulnerabilities are the most severe and should
be evaluated first. An accepted vulnerability is one which has been manually reviewed and classified as acceptable
to not fix at this time, such as a false positive detection or an intentional part of the system's architecture.

Critical High Medium Low Accepted

0 0 0 2 0
100%

1.2 Report Coverage


This report includes findings for 1 target scanned. Each target is a single URL, IP address, or fully qualified domain
name (FQDN).

Vulnerability Categories

2
Open TCP Ports

hostedscan.com 3
Vulnerabilities By Target Vulnerability Scan Report

2 Vulnerabilities By Target
This section contains the vulnerability findings for each scanned target. Prioritization should be given to the
targets with the highest severity vulnerabilities. However, it is important to take into account the purpose of each
system and consider the potential impact a breach or an outage would have for the particular target.

2.1 Targets Summary


The number of potential vulnerabilities found for each target by severity.

Target Critical High Medium Low Accepted

https://www.glamourbook.com/ 0 0 0 2 0

hostedscan.com 4
Vulnerabilities By Target | https://www.glamourbook.com/ Vulnerability Scan Report

2.2 Target Breakdowns


Details for the potential vulnerabilities found for each target by scan type.

https://www.glamourbook.com/
Total Risks

0 0 0 2 0

100%

Open TCP Ports Severity First Detected Last Detected

Open TCP Port: 443 Low 0 days ago 0 days ago

Open TCP Port: 80 Low 0 days ago 0 days ago

hostedscan.com 5
Open TCP Ports Vulnerability Scan Report

3 Open TCP Ports


The NMAP TCP port scan discovers open TCP ports with a complete scan of ports 0 to 65535.

3.1 Total Vulnerabilities


Total number of vulnerabilities found by severity.

Critical High Medium Low Accepted

0 0 0 2 0
100%

3.2 Vulnerabilities Breakdown


Summary list of all detected vulnerabilities.

Title Severity Open Accepted

Open TCP Port: 443 Low 1 0

Open TCP Port: 80 Low 1 0

hostedscan.com 6
Open TCP Ports | Open TCP Port: 443 Vulnerability Scan Report

3.3 Vulnerability Details


Detailed information about each potential vulnerability found by the scan.

Open TCP Port: 443


SEVERITY AFFECTED TARGETS LAST DETECTED
Low 1 target 0 days ago

Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443 to
serve websites over https. For a list of commonly used ports see https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be dangerous
when expected services are out of date and exploited through security vulnerabilities.

Vulnerable Target First Detected Last Detected

https://www.glamourbook.com/ 0 days ago 0 days ago

hostedscan.com 7
Open TCP Ports | Open TCP Port: 80 Vulnerability Scan Report

Open TCP Port: 80


SEVERITY AFFECTED TARGETS LAST DETECTED
Low 1 target 0 days ago

Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443 to
serve websites over https. For a list of commonly used ports see https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be dangerous
when expected services are out of date and exploited through security vulnerabilities.

Vulnerable Target First Detected Last Detected

https://www.glamourbook.com/ 0 days ago 0 days ago

hostedscan.com 8
Glossary Vulnerability Scan Report

4 Glossary
Accepted Vulnerability Open TCP Ports
An accepted vulnerability is one which has been manually The NMAP TCP port scan discovers open TCP ports with a
reviewed and classified as acceptable to not fix at this complete scan of ports 0 to 65535.
time, such as a false positive scan result or an intentional
part of the system's architecture. Vulnerability
A weakness in the computational logic (e.g., code) found
Fully Qualified Domain Name (FQDN) in software and hardware components that, when
A fully qualified domain name is a complete domain name exploited, results in a negative impact to confidentiality,
for a specific website or service on the internet. This integrity, or availability. Mitigation of the vulnerabilities in
includes not only the website or service name, but also the this context typically involves coding changes, but could
top-level domain name, such as .com, .org, .net, etc. For also include specification changes or even specification
example, 'www.example.com' is an FQDN. deprecations (e.g., removal of affected protocols or
functionality in their entirety).

Target
A target represents target is a single URL, IP address, or
fully qualified domain name (FQDN) that was scanned.

Severity
Severity represents the estimated impact potential of a
particular vulnerability. Severity is divided into 5
categories: Critical, High, Medium, Low and Accepted.

CVSS Score
The CVSS 3.0 score is a global standard for evaluating
vulnerabilities with a 0 to 10 scale. CVSS maps to threat
levels:
0.1 - 3.9 = Low
4.0 - 6.9 = Medium
7.0 - 8.9 = High
9.0 - 10.0 = Critical

hostedscan.com 9
This report was prepared using

HostedScan Security ®
For more information, visit hostedscan.com
Founded in Seattle, Washington in 2019, HostedScan, LLC. is
dedicated to making continuous vulnerability scanning and risk
management much more easily accessible to more businesses.

HostedScan, LLC.
2212 Queen Anne Ave N
Suite #521 Terms & Policies
Seattle, WA 98109 [email protected]

hostedscan.com 10

You might also like