LastHash Logo
Detection Engine

Deep Vulnerability Scanning

Detect outdated software, vulnerable plugins, insecure configurations, and known security flaws before attackers exploit them.

What We Detect

Comprehensive vulnerability identification across your entire web stack

Outdated CMS

Detect outdated WordPress, Joomla, Drupal, and other content management systems with known vulnerabilities.

Vulnerable Libraries

Identify outdated JavaScript libraries, frameworks, and dependencies with security flaws.

Plugin Vulnerabilities

Scan for vulnerable WordPress plugins, Joomla extensions, and third-party components.

Configuration Issues

Find insecure server configurations, missing security headers, and weak SSL/TLS settings.

Application Vulnerabilities

Detect SQL injection, XSS, CSRF, and other OWASP Top 10 vulnerabilities.

Security Weaknesses

Identify weak authentication, missing encryption, and poor security practices.

Example Vulnerability Report

See exactly what vulnerabilities we detect and how they're reported

Detected Vulnerabilities

Outdated WordPress Core

Version 5.8.0 detected (Latest: 6.4.2)

Critical

Multiple critical security vulnerabilities exist in WordPress 5.8.0, including SQL injection and XSS flaws.

CVE: CVE-2023-xxxxx

Vulnerable jQuery Version

jQuery 1.12.4 (Known XSS vulnerability)

High

This version of jQuery contains a known cross-site scripting (XSS) vulnerability.

CVE: CVE-2020-11022

Missing Security Headers

Content-Security-Policy header not set

Medium

Missing CSP header increases risk of XSS attacks and data injection vulnerabilities.

Weak SSL Configuration

TLS 1.0 and 1.1 supported

Low

Outdated TLS versions should be disabled. Only TLS 1.2 and 1.3 should be supported.

How Vulnerability Scanning Works

Automated security analysis in four steps

1

Technology Detection

Identify all software, frameworks, libraries, and CMS platforms running on your website.

2

Version Analysis

Compare detected versions against our vulnerability database of known security flaws.

3

Configuration Scan

Check for missing security headers, weak SSL settings, and insecure server configurations.

4

Risk Classification

Assign severity ratings (Critical, High, Medium, Low) based on exploitability and impact.

Scan Your Website for Vulnerabilities

Get a comprehensive security report in minutes