Example Scan Results
Here's what a typical vulnerability scan report looks like. Each finding includes severity rating, CVSS score, OWASP category mapping, evidence, and actionable remediation guidance.
Note: These are illustrative examples. Actual results vary based on the target website.
CVE-2024-21762 - FortiOS Out-of-Bound Write
Detected FortiOS v7.4.2 running on target. This version is vulnerable to unauthenticated remote code execution via crafted HTTP requests.
Upgrade FortiOS to v7.4.3 or later immediately. This CVE is actively exploited in the wild and listed in CISA KEV.
Missing Content-Security-Policy Header
No Content-Security-Policy header found on any response. Site is vulnerable to XSS and data injection attacks.
Implement a strict CSP header: default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data:;
TLS 1.0/1.1 Enabled
Server accepts TLS 1.0 and TLS 1.1 connections, both deprecated since 2020.
Disable TLS 1.0 and TLS 1.1 in server configuration. Only allow TLS 1.2 and TLS 1.3.
Server Version Disclosure
Server header reveals: Apache/2.4.51 (Ubuntu). Information disclosure aids attacker reconnaissance.
Add 'ServerTokens Prod' and 'ServerSignature Off' to Apache configuration.
WordPress 6.4.2 Detected
WordPress 6.4.2 detected via meta generator tag and wp-content paths. Latest version is 6.7.1.
Update WordPress to the latest stable version. Enable automatic security updates.
Ready to scan your website?
Get the same comprehensive assessment for your domain. No account required - results delivered to your inbox.
Scan Your Website