Table of Contents:
Vulnerability scanners (e.g., Nmap, Nessus, etc.) designed to test computers, computer systems, networks or applications for weaknesses.
These scanners sends specially crafted packets (based on the known vulnerabilities) to the target host and then analyze the responses.
Based on the received responses, the scanners produce reports that show, which systems were found vulnerable.
This article lists known false-positive vulnerability results regarding Check Point software.
List of vulnerability scan results
- sk112277 and sk169775 content added.