The Application Procedure follows below:
In computer security, a vulnerability is a weakness which can be exploited by a threat actor, such as an attacker, to perform unauthorized actions within a computer system. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, we developed a tool that identifies and classifies potential vulnerabilities in several components in a network such as servers, applications, routers, firewalls etc. It focuses on finding potential vulnerabilities which are known based on CVE (Common Vulnerabilities and Exposures) which is a list of entries for publicly known cybersecurity vulnerabilities, such as SQL injection and insecure server configuration.
Vulnerability scanner tool’s efficacy mainly depends on the ability of the scanner to locate and identify devices and generally gather systems’ information and the ability to correlate the gathered information with known vulnerabilities from a vulnerability database (CVE). A detailed report is prepared as soon as the scan is complete, characterized by a unique identifier. The report contains details about the discovered vulnerabilities for each host examined during the scan.