February 17, 2025
Vulnerability Scan
Report
Prepared By
HostedScan Security
hostedscan.com
HostedScan Security Vulnerability Scan Report
Overview
1 Executive Summary 3
2 Vulnerabilities By Target 4
3 Open TCP Ports 6
4 Glossary 9
hostedscan.com 2
Executive Summary Vulnerability Scan Report
1 Executive Summary
Vulnerability scans were conducted on select servers, networks, websites, and applications. This report contains the
discovered potential vulnerabilities from these scans. Vulnerabilities have been classified by severity. Higher severity
indicates a greater risk of a data breach, loss of integrity, or availability of the targets.
1.1 Total Vulnerabilities
Below are the total number of vulnerabilities found by severity. Critical vulnerabilities are the most severe and should
be evaluated first. An accepted vulnerability is one which has been manually reviewed and classified as acceptable
to not fix at this time, such as a false positive detection or an intentional part of the system's architecture.
Critical High Medium Low Accepted
0 0 0 2 0
100%
1.2 Report Coverage
This report includes findings for 1 target scanned. Each target is a single URL, IP address, or fully qualified domain
name (FQDN).
Vulnerability Categories
2
Open TCP Ports
hostedscan.com 3
Vulnerabilities By Target Vulnerability Scan Report
2 Vulnerabilities By Target
This section contains the vulnerability findings for each scanned target. Prioritization should be given to the
targets with the highest severity vulnerabilities. However, it is important to take into account the purpose of each
system and consider the potential impact a breach or an outage would have for the particular target.
2.1 Targets Summary
The number of potential vulnerabilities found for each target by severity.
Target Critical High Medium Low Accepted
https://www.glamourbook.com/ 0 0 0 2 0
hostedscan.com 4
Vulnerabilities By Target | https://www.glamourbook.com/ Vulnerability Scan Report
2.2 Target Breakdowns
Details for the potential vulnerabilities found for each target by scan type.
https://www.glamourbook.com/
Total Risks
0 0 0 2 0
100%
Open TCP Ports Severity First Detected Last Detected
Open TCP Port: 443 Low 0 days ago 0 days ago
Open TCP Port: 80 Low 0 days ago 0 days ago
hostedscan.com 5
Open TCP Ports Vulnerability Scan Report
3 Open TCP Ports
The NMAP TCP port scan discovers open TCP ports with a complete scan of ports 0 to 65535.
3.1 Total Vulnerabilities
Total number of vulnerabilities found by severity.
Critical High Medium Low Accepted
0 0 0 2 0
100%
3.2 Vulnerabilities Breakdown
Summary list of all detected vulnerabilities.
Title Severity Open Accepted
Open TCP Port: 443 Low 1 0
Open TCP Port: 80 Low 1 0
hostedscan.com 6
Open TCP Ports | Open TCP Port: 443 Vulnerability Scan Report
3.3 Vulnerability Details
Detailed information about each potential vulnerability found by the scan.
Open TCP Port: 443
SEVERITY AFFECTED TARGETS LAST DETECTED
Low 1 target 0 days ago
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443 to
serve websites over https. For a list of commonly used ports see https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be dangerous
when expected services are out of date and exploited through security vulnerabilities.
Vulnerable Target First Detected Last Detected
https://www.glamourbook.com/ 0 days ago 0 days ago
hostedscan.com 7
Open TCP Ports | Open TCP Port: 80 Vulnerability Scan Report
Open TCP Port: 80
SEVERITY AFFECTED TARGETS LAST DETECTED
Low 1 target 0 days ago
Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443 to
serve websites over https. For a list of commonly used ports see https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be dangerous
when expected services are out of date and exploited through security vulnerabilities.
Vulnerable Target First Detected Last Detected
https://www.glamourbook.com/ 0 days ago 0 days ago
hostedscan.com 8
Glossary Vulnerability Scan Report
4 Glossary
Accepted Vulnerability Open TCP Ports
An accepted vulnerability is one which has been manually The NMAP TCP port scan discovers open TCP ports with a
reviewed and classified as acceptable to not fix at this complete scan of ports 0 to 65535.
time, such as a false positive scan result or an intentional
part of the system's architecture. Vulnerability
A weakness in the computational logic (e.g., code) found
Fully Qualified Domain Name (FQDN) in software and hardware components that, when
A fully qualified domain name is a complete domain name exploited, results in a negative impact to confidentiality,
for a specific website or service on the internet. This integrity, or availability. Mitigation of the vulnerabilities in
includes not only the website or service name, but also the this context typically involves coding changes, but could
top-level domain name, such as .com, .org, .net, etc. For also include specification changes or even specification
example, 'www.example.com' is an FQDN. deprecations (e.g., removal of affected protocols or
functionality in their entirety).
Target
A target represents target is a single URL, IP address, or
fully qualified domain name (FQDN) that was scanned.
Severity
Severity represents the estimated impact potential of a
particular vulnerability. Severity is divided into 5
categories: Critical, High, Medium, Low and Accepted.
CVSS Score
The CVSS 3.0 score is a global standard for evaluating
vulnerabilities with a 0 to 10 scale. CVSS maps to threat
levels:
0.1 - 3.9 = Low
4.0 - 6.9 = Medium
7.0 - 8.9 = High
9.0 - 10.0 = Critical
hostedscan.com 9
This report was prepared using
HostedScan Security ®
For more information, visit hostedscan.com
Founded in Seattle, Washington in 2019, HostedScan, LLC. is
dedicated to making continuous vulnerability scanning and risk
management much more easily accessible to more businesses.
HostedScan, LLC.
2212 Queen Anne Ave N
Suite #521 Terms & Policies
Seattle, WA 98109 hello@hostedscan.com
hostedscan.com 10