Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All service groups
AWS
Azure
Google
Kubernetes
Report a new vulnerability
RULE
SERVICE GROUP
M
Virtual machine unattached disk is not encrypted
Compute
M
Virtual Machine unattached managed disks should be encrypted with Customer Managed Keys
Storage
M
Virtual Machines should use Managed Disks
Storage
M
Virtual network DDoS protection plan is disabled
Network
M
Virtual Network Network Watcher should be enabled
Monitor
M
Virtual network security group permits ingress from '0.0.0.0/0' to port 22 (SSH)
Network
M
VM Agent is not provisioned automatically for linux
Compute
M
VM Agent is not provisioned automatically for Windows
Compute
M
VPC default security group allows unrestricted egress traffic
VPC
M
VPC default security group allows unrestricted ingress traffic
VPC
M
VPC endpoint policy allows full access to service
VPC
M
VPC flow logging is not enabled
VPC
M
VPC flow logs for VPC network subnets are disabled
Compute Engine
M
VPC network ACL allows ingress from '0.0.0.0/0' to port 22
VPC
M
VPC network ACL allows ingress from 0.0.0.0/0 to port 3389
VPC
M
VPC security group allows ingress from any address to all ports and protocols
VPC
M
VPC security group attached to EC2 instance allows ingress from '0.0.0.0/0' to all ports
VPC
M
VPC security group attached to EC2 instance permits ingress from '0.0.0.0/0' to port 389 (LDAP)
VPC
M
VPC security group attached to RDS instance permits ingress from '0.0.0.0/0' to all ports
VPC
M
VPC security group inbound rule allows ingress from '0.0.0.0/0' to all ports and protocols
VPC
M
VPC security group inbound rule permits ingress from a public address to all ports and protocols
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 11214 (Memcached SSL)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 11215 (Memcached SSL)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 135 (MSSQL Debugger)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 137 (NetBIOS Name Service)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 138 (NetBios Datagram Service)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 139 (NetBios Session Service)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 1433 (MSSQL Server)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 1434 (MSSQL Admin)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 22 (SSH)
VPC
Previous
Next