72 |
73 |
Crosss Site Scripting (XSS)
74 |
SQL Injection
75 |
File Inclusion
76 |
The following are the scan results.
77 |
78 |
79 |
80 | | ID |
81 | Time |
82 | Method |
83 | Protocol |
84 | Port |
85 | Host |
86 | Status |
87 | View |
88 |
89 |
90 |
91 |
92 | |
93 |
94 | |
95 |
96 |
97 | |
98 |
99 |
100 | |
101 |
102 |
103 | |
104 |
105 |
106 | |
107 |
108 |
109 |
110 | |
111 |
112 | vulnerable
113 | not vulnerable
114 | not scan yet
115 |
116 | vulnerable
117 | not vulnerable
118 | not scan yet
119 |
120 | vulnerable
121 | not vulnerable
122 | not scan yet
123 | |
124 |
125 |
126 | |
127 |
128 |
129 |
130 |
131 |
138 |
139 |
140 |