This report covers 2 target(s) scanned by EdgeIQ Labs security tools. A total of 11 issue(s) were identified with an overall risk score of 62/100 (HIGH). Immediate action is recommended. Critical vulnerabilities in XSS, exposed database ports, and an expired SSL certificate require urgent remediation.
| Port | Protocol | Service | Version | Severity |
|---|---|---|---|---|
| 22 | tcp | ssh | OpenSSH 8.2p1 | MEDIUM |
| 80 | tcp | http | nginx 1.18.0 | INFO |
| 443 | tcp | https | nginx 1.18.0 | INFO |
| 3306 | tcp | mysql | MySQL 8.0.29 | HIGH |
| CVE ID | Description | CVSS | Severity |
|---|---|---|---|
CVE-2021-44228 | Log4j Remote Code Execution (Log4Shell) | 10.0 | CRITICAL |
CVE-2022-12345 | OpenSSH 8.2p1 username enumeration | 7.8 | HIGH |
CVE-2021-3450 | MySQL privilege escalation via native plug-in | 8.8 | HIGH |
Valid: 2026-01-15T00:00:00Z → 2026-04-15T23:59:59Z
Protocol: TLS 1.2
Headers:
Strict-Transport-Security: max-age=31536000; includeSubDomainsX-Content-Type-Options: nosniffX-Frame-Options: DENYX-XSS-Protection: 1; mode=blockContent-Security-Policy: default-src 'self'Issues:
| Time | Alert | Target | Severity |
|---|---|---|---|
| 2026-04-22T14:32:00Z | Port 3306 (MySQL) Opened on example.com | example.com | HIGH |
| 2026-04-20T09:10:00Z | Critical CVE-2021-44228 (Log4Shell) Detected | example.com | CRITICAL |
| 2026-04-18T16:45:00Z | XSS Payload Detected in User Input | example.com | MEDIUM |
| 2026-04-15T23:59:59Z | SSL Certificate Expired on example.com | example.com | CRITICAL |