Home

Vulnerability Categories

Search for vulnerabilities in containers or images using categories. These are the values that can be provided for tokens that require you to give a vulnerability category.

AmazonLinux

Backdoors and trojan horses

Brute Force Attack

CGI

Database

Debian

DNS and BIND

E-Commerce

File Transfer Protocol

Finger

Firewall

Forensics

General remote services

HP-UX

Hardware

Information gathering

Internet Explorer

Local

Mail services

NFS

News Server

OEL

OVAL

Office Application

Proxy

RPC

RedHat

SMB / NEtBIOS

SNMP

SUSE

Security Policy

TCP/IP

Ubuntu

VMware

Web Application

Web Application Firewall

Web server

Windows

X-Window