© GamaSec Vulnerability Assessment Report
 
Target Scanned : www.Scan-Your-Eshop.com:80
Report Generated : DD/MM/YYYY
 
Table Of Contents
Introduction
Executive Summary
Technical Details
 
Introduction
"Explore Your Vulnerabilities" 
A remote web vulnerability assessment was conducted by GamaScan against the web-interfaced system. The purpose of this assessment was to remotely identify and quantify vulnerabilities or potential threats in the web-interfaced system before they are exploited by attackers. The tests performed by GamaScan are customized dynamically to the scanned target and includes thousands of known vulnerabilities,dynamic tests and web application vulnerabilities.

By assessing the web-interfaced system remotely GamaScan accurately mimicking the attacker's view.
GamaScan Automated Web-Application Vulnerability Assessment Service Key features:

Zero time setup.

No software installation.

No special hardware.

No special training.

Pre defined or customizable scans.

Detailed, Crystal clear, reports.

Constant updates.

 
Executive Summary
This section provides an overview of the vulnerability assessment results and shows the distribution of vulnerabilities by severity level and by category.
Security Threat Level
This graph presents the security threat level based on the vulnerabilities identified by GamaScan.
The "Threat Level" is classified as being of Informational, Low, Medium or High severity.
Vulnerabilities by Severity
This section shows the number of vulnerabilities identified by GamaScan, grouped according to their severity levels. vulnerabilities are classified as being of High, Medium, Low or Informational severity.
10
207
2
15

Vulnerabilities by Category
This section shows the number of vulnerabilities identified by GamaScan, grouped according to their categories.
Number of Vulnerabilities by Category
Category Number of Vulnerabilites
Web Servers 5  
HTTP Methods 4  
SQL Injection 7  
CRLF Injection 1  
Cookie Manipulation 10  
Script Language Error 14  
Cross-Site Scripting 178  
Percent of Vulnerabilities by Category
Vulnerabilities by Attacks Category
This chart shows the distribution of vulnerabilities by "Known Vulnerabilities" and by "Web Application Vulnerabilities".
"Known Vulnerabilites" are identified using known attack signatures.
"Web Application Vulnerabilities" are identified using web attacks customized to the scanned web application.
Number of Vulnerabilities by "Web Application"
 
Technical Details
This section provides details on the open ports, web server, vulnerabilities and threats identified on the system.
 
Open Port [ 1 ]
This table shows the open port on the system. not each open port is a security threat, but open ports on the system are invitations to attackers. In general, the number of open ports should be kept to a minimum and only the mission-critical ports should be open.
Port Number Service Description
80 (tcp) http World Wide Web HTTP
 
Web Server
This table provides general details on the web server identified by GamaScan.
Target Banner

Microsoft-IIS/5.0

Http Methods

OPTIONS, TRACK, GET

Cookie

SESSIONID=JHLPLGPBEHDPDCMKIAAOK

 
Vulnerabilities Findings
This section provides technical details on the vulnerabilities identified by GamaScan, vulnerabilities are classified as being of High, Medium, Low or Informational severity and grouped according to their severity levels.


[ Expand ]
[ Expand ]
[ Expand ]
[ Expand ]

Site Map
This section lists the identified pages on the web site, the pages are organized hierarchically starting with the top of the tree, the Site Map provides an easy way to understand the web site's structure.
JavaScript Tree Menu

 
This product includes data from the Open Source Vulnerability Database developed by OSVDB (www.osvdb.org) and its contributors.
 
____________________________________________________
Copyright © GamaSec. All rights reserved.