Plugins that detect the presence of a malicious file or backdoor access that can potentially lead to unauthorized access to a system.
Plugins for vulnerabilities that leverage the common gateway interface.
Plugins for vulnerabilities that leverage the common gateway interface, that specifically cause cross-site scripting issues.
Plugins that relate to vulnerability detection of Cisco devices.
Plugins that relate to specific database applications and their vulnerabilities.
Plugins that test Unix hosts for a variety of accounts that could be installed by default during application installation.
Plugins that directly test for vulnerabilities that cause a denial of service. This plugin family will be executed when Safe Checks are disabled.
Plugins that deal with firewall devices and software that do not have a specified family.
Plugins that deal with vulnerabilities that attempt to gain a shell on a host or device.
Plugins that mostly gather information for other checks.
Deprecated / disabled
Plugins that are host and device neutral.
Plugins that deal with mobile devices.
Plugins that specifically deal with Novell Netware.
Plugins for detection of software and vulnerabilities of peer-to-peer sharing applications.
Plugins used by the Compliance and Audit function to leverage an audit file against a host.
Plugins that gather port information.
Plugins that leverage SCADA for gathering information and vulnerability checks.
Plugins that detect the specific protocol or application listening on a port.
Plugins that specifically deal with the scanner settings and scan information.
Plugins specifically for web servers.
Plugins that relate to the Windows platform and applications.
Windows local security checks that specifically cover a Microsoft Bulletin.
Windows local security checks that specifically cover user information.
The following categories leverage data gathered using the credentials provided to a host or device:
The following categories are for plugins that deal with the specific protocol:
Plugins that detect the presence of a malicious file or backdoor access that can potentially lead to unauthorized access to a system.
Plugins for vulnerabilities that leverage the common gateway interface.
Plugins to identify cloud services which may place intellectual property at risk.It is not intended for social media services (social media usage detection would typically be found in the Policy family).
Identifies DNS server related installations
Plugins that detect protected data that is being leaked via unsecured or poorly secured protocols
Plugins that relate to specific database applications and their vulnerabilities.
Plugins related to FTP client detection
Plugins related to the detection of FTP Servers
Plugins to identify finger daemon services
Plugins to identify general software that do not fit in any other categories, normally are host and device neutral
Plugins to identify activity reflecting IMAP Server functionality
Plugins to identify the presence of IRC Clients
Plugins to identify the presence of IRC Servers Functionality
Plugins to identify online chat applications
Plugins to identify hosted services that accept connections from the Internet
Plugins to identify Internet of Things Devices in the Network
Plugins that deal with mobile devices.
Plugins to identify different Operating Systems in the network
Plugins to identify POP Servers in the network
Plugins to identify peer-to-peer file sharing applications or services
Plugins to identify software or services that could go against a company’s acceptable use or security policy.
Plugins to identify Remote Procedure Calls
Plugins related to Supervisory Control and Data Acquisition (SCADA)/Industrial Control System (ICS) plugins
Plugins related to the identification of SMTP Clients
Plugins related to the identification of SMTP Servers
Plugins related to the identification of SNMP Services
Plugins to identify SSH Servers
Plugins to identify Samba services
Plugins specifically for web clients.
Plugins related to authentication and session issues
Plugins allowing code to be executed on the server and/or the application
Information and vulnerabilities found on components used to build web applications
Plugins specifically for XSRF issues
Plugins specifically for all types of XSS issues
Plugins specifically for all types of XSS issues
Plugins to identify that a file can be uploaded to the scanned asset
Plugins for Scan General Information
Plugins to identify information and vulnerabilities on HTTP headers used by the web application
Plugins to identify different types of injection (SQL, noSQL, Code)
Information and vulnerabilities on the HTTPs protocol and certificates used by the web application
Plugins to identify information/Detection collected on the web application
Plugins to identify Information/Detection collected on the web server running the web application
Plugins related to Supervisory Control and Data Acquisition (SCADA)/Industrial Control System (ICS) plugins
The interaction of data between a user and a website.
A plugin that uses the provided authentication credentials to gather information on a host or device.
A specific attack in which malicious script code could be executed by a website.
A specific attack in which a service, device, or host is rendered unusable or unreachable for its intended purpose.
A security device or software that manages the interaction between devices over a network.
A user interface for interacting with the OS or device.
A type of network that has no central server; instead each node can act as both server and client.
A control system for high-level process supervisory management.
(The words plugins and checks is used interchangeably in this context)