University of Wisconsin–Madison

What is Vulnerability Scanning and what are some scan types (Source: kb.wisc.edu/59054)? Vulnerability scanning is an automated process of identifying security vulnerabilities (weaknesses) of computing systems such as web applications and servers. UW–‍Madison Office of Cybersecurity offers vulnerability scanning service and will work with you to secure your applications and servers.

A Host-based Vulnerability Scanner is used to proactively identify and address security vulnerabilities by scanning the hosts in our network based on known flaws. Findings are displayed in reports that departments can use to tighten the security for those assets.

A Web Application Vulnerability Scanner is used to identify known security vulnerabilities of web applications such as cross-site scripting, SQL injection, etc. and generate reports of findings that developers can use to tighten the security for the web applications in our network.