Categories

Vulnerability Categories as defined by our service as of March 2017 are listed below.

Want a current listing? Just log in to your Qualys account, go to the KnowledgeBase, click the Search button, and open the Category menu.

Looking for category descriptions? We’ve got you covered. Log in to your Qualys account, go to Help > Online Help and search for Categories and you’ll see the article on Vulnerability Categories with all the details.

Tip - In API requests replace spaces in category names with underscores. For example, Amazon Linux must be specified as Amazon_Linux.

A-D | E-H | I-N | O-S | T-X

 

A-D (back to top)

AIX

Amazon Linux

Backdoors and trojan horses

Brute Force Attack

CentOS

CGI

Cisco

Database

Debian

DNS and BIND

E-H (back to top)

E-Commerce

Fedora

File Transfer Protocol

Finger

Firewall

Forensics

General remote services

Hardware

HP-UX

I-N (back to top)

Information gathering

Internet Explorer

Local

Mail services

Malware

News Server

NFS

O-S (back to top)

OEL

Office Application

Proxy

RedHat

RPC

Security Policy

SNMP

Solaris

SMB / NETBIOS

SUSE

T-X (back to top)

TCP/IP

Ubuntu

VMware

Web Application

Web Application Firewall

Web server

Windows

X-Window