Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All service groups
AWS
Azure
Google
All Google service groups
App Engine
Artifact Registry
BigQuery
Cloud DNS
Cloud Functions
Cloud KMS
Cloud Platform
Cloud SQL
Cloud Storage
Compute Engine
Compute
Container
Dataflow
Dataproc
Filestore
IAM
Kubernetes (Container) Engine
Monitor
Network
Redis
Secrets Manager
Storage
Kubernetes
Report a new vulnerability
RULE
SERVICE GROUP
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 2379 (etcd)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 2382 (SQL Server Analysis Services browser)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 2383 (SQL Server Analysis Services)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 2484 (Oracle DB SSL)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 27017 (MongoDB)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 27018 (MongoDB)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 27019 (MongoDB)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 3000 (Ruby on Rails web server)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 3020 (CIFS / SMB)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 3306 (MySQL)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 4505 (SaltStack Master)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 4506 (SaltStack Master)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 5432 (PostgreSQL)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 5500 (Virtual Network Computing)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 5800 (Virtual Network Computing) and is not attached to an ELB
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 5900 (Virtual Network Computing)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 61621 (Cassandra OpsCenter Agent)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 636 (LDAP SSL)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 7001 (Cassandra)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 8000 (HTTP Alternate)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 9200 (Elasticsearch)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 9300 (Elasticsearch)
VPC
M
VPC security group rules permit ingress from '0.0.0.0/0' to port 3389
VPC
M
VPN gateway is not configured in active-active mode
Network
M
WAF is not enabled on application gateway
Network
M
WAF prevention mode not enabled
Network
M
Wildcard action has been specified in policy
Secrets Manager
M
Wildcard action has been specified in policy action
ElasticSearch
M
Wildcard principal has been specified in access policy
SQS
M
Wildcard principal has been specified in access policy
Secrets Manager
Previous
Next