Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All service groups
AWS
Azure
All Azure service groups
API Management
App Service (Web Apps)
Authorization
Automation
Batch
CDN
Compute
Container
CosmosDB (DocumentDB)
Data Factory
Data Lake
Database
Key Vault
Monitor
Network
Redis
Role
Search
Security Center
Service Fabric
Storage
Synapse
Google
Kubernetes
Report a new vulnerability
RULE
SERVICE GROUP
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 2379 (etcd)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 2382 (SQL Server Analysis Services browser)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 2383 (SQL Server Analysis Services)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 2484 (Oracle DB SSL)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 27017 (MongoDB)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 27018 (MongoDB)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 27019 (MongoDB)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 3000 (Ruby on Rails web server)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 3020 (CIFS / SMB)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 3306 (MySQL)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 4505 (SaltStack Master)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 4506 (SaltStack Master)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 5432 (PostgreSQL)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 5500 (Virtual Network Computing)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 5800 (Virtual Network Computing) and is not attached to an ELB
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 5900 (Virtual Network Computing)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 61621 (Cassandra OpsCenter Agent)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 636 (LDAP SSL)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 7001 (Cassandra)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 8000 (HTTP Alternate)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 9200 (Elasticsearch)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 9300 (Elasticsearch)
VPC
M
VPC security group rules permit ingress from '0.0.0.0/0' to port 3389
VPC
M
VPN gateway is not configured in active-active mode
Network
M
WAF is not enabled on application gateway
Network
M
WAF prevention mode not enabled
Network
M
Wildcard action has been specified in policy
Secrets Manager
M
Wildcard action has been specified in policy action
ElasticSearch
M
Wildcard principal has been specified in access policy
SQS
M
Wildcard principal has been specified in access policy
Secrets Manager
Previous
Next