Vulnerability Categories as defined by our service as of March 2017 are listed below.
Want a current listing? Just log in to your Qualys account, go to the KnowledgeBase, click the Search button, and open the Category menu.
Looking for category descriptions? We’ve got you covered. Log in to your Qualys account, go to Help > Online Help and search for Categories and you’ll see the article on Vulnerability Categories with all the details.
Tip - In API requests replace spaces in category names with underscores. For example, Amazon Linux must be specified as Amazon_Linux.
A-D (back to top)
AIX
Amazon Linux
Backdoors and trojan horses
Brute Force Attack
CentOS
CGI
Cisco
Database
Debian
DNS and BIND
E-H (back to top)
E-Commerce
Fedora
File Transfer Protocol
Finger
Firewall
Forensics
General remote services
Hardware
HP-UX
I-N (back to top)
Information gathering
Internet Explorer
Local
Mail services
Malware
News Server
NFS
O-S (back to top)
OEL
Office Application
Proxy
RedHat
RPC
Security Policy
SNMP
Solaris
SMB / NETBIOS
SUSE
T-X (back to top)
TCP/IP
Ubuntu
VMware
Web Application
Web Application Firewall
Web server
Windows
X-Window