{"version":3,"sources":["webpack:///webpack/bootstrap","webpack:///./app/javascript/packs/report.js"],"names":["installedModules","__webpack_require__","moduleId","exports","module","i","l","modules","call","m","c","d","name","getter","o","Object","defineProperty","enumerable","get","r","Symbol","toStringTag","value","t","mode","__esModule","ns","create","key","bind","n","object","property","prototype","hasOwnProperty","p","s","document","addEventListener","data","pciCategories","text","subCategories","subInfo","vrmsCategories","penetrationCategories","hasPci","querySelector","hasVrms","hasPenetration","moreInfoMarkup","currentProduct","moreInfoTemplate","categoryName","categoryText","categorySubText","liTagSubInfo","map","item","renderCategory","category","outputMarkup","forEach","subCategory","renderResult","pciMoreInfo","innerHTML","concat","style","borderTop","setAttribute","setTimeout","removeAttribute","vrmsMoreInfo","penetrationMoreInfo","adjustWrapperHeight","sealCardDivs","querySelectorAll","sealCardsTotalHeight","elem","index","clientHeight","reportWrapperHeight","reportWrapperDiv","classList","contains","add","remove","join","feather","replace","renderMenus","event","target","matches","links","length","clickedCategoryName","textContent","currentMenu","closest","currentSealCard","previousElementSibling"],"mappings":"aACE,IAAIA,EAAmB,CAAC,EAGxB,SAASC,EAAoBC,GAG5B,GAAGF,EAAiBE,GACnB,OAAOF,EAAiBE,GAAUC,QAGnC,IAAIC,EAASJ,EAAiBE,GAAY,CACzCG,EAAGH,EACHI,GAAG,EACHH,QAAS,CAAC,GAUX,OANAI,EAAQL,GAAUM,KAAKJ,EAAOD,QAASC,EAAQA,EAAOD,QAASF,GAG/DG,EAAOE,GAAI,EAGJF,EAAOD,OACf,CAIAF,EAAoBQ,EAAIF,EAGxBN,EAAoBS,EAAIV,EAGxBC,EAAoBU,EAAI,SAASR,EAASS,EAAMC,GAC3CZ,EAAoBa,EAAEX,EAASS,IAClCG,OAAOC,eAAeb,EAASS,EAAM,CAAEK,YAAY,EAAMC,IAAKL,GAEhE,EAGAZ,EAAoBkB,EAAI,SAAShB,GACX,qBAAXiB,QAA0BA,OAAOC,aAC1CN,OAAOC,eAAeb,EAASiB,OAAOC,YAAa,CAAEC,MAAO,WAE7DP,OAAOC,eAAeb,EAAS,aAAc,CAAEmB,OAAO,GACvD,EAOArB,EAAoBsB,EAAI,SAASD,EAAOE,GAEvC,GADU,EAAPA,IAAUF,EAAQrB,EAAoBqB,IAC/B,EAAPE,EAAU,OAAOF,EACpB,GAAW,EAAPE,GAA8B,kBAAVF,GAAsBA,GAASA,EAAMG,WAAY,OAAOH,EAChF,IAAII,EAAKX,OAAOY,OAAO,MAGvB,GAFA1B,EAAoBkB,EAAEO,GACtBX,OAAOC,eAAeU,EAAI,UAAW,CAAET,YAAY,EAAMK,MAAOA,IACtD,EAAPE,GAA4B,iBAATF,EAAmB,IAAI,IAAIM,KAAON,EAAOrB,EAAoBU,EAAEe,EAAIE,EAAK,SAASA,GAAO,OAAON,EAAMM,EAAM,EAAEC,KAAK,KAAMD,IAC9I,OAAOF,CACR,EAGAzB,EAAoB6B,EAAI,SAAS1B,GAChC,IAAIS,EAAST,GAAUA,EAAOqB,WAC7B,WAAwB,OAAOrB,EAAgB,OAAG,EAClD,WAA8B,OAAOA,CAAQ,EAE9C,OADAH,EAAoBU,EAAEE,EAAQ,IAAKA,GAC5BA,CACR,EAGAZ,EAAoBa,EAAI,SAASiB,EAAQC,GAAY,OAAOjB,OAAOkB,UAAUC,eAAe1B,KAAKuB,EAAQC,EAAW,EAGpH/B,EAAoBkC,EAAI,UAIjBlC,EAAoBA,EAAoBmC,EAAI,G,oBCsXrDC,SAASC,iBAAiB,oBAxc1B,WAKI,IAAIC,EAAO,CACPC,cAAe,CACX,CACI5B,KAAM,wBACN6B,KAAM,qTAINC,cAAe,CACX,CAAE9B,KAAM,yBAA0B6B,KAAM,qLAIhD,CACI7B,KAAM,oBACN6B,KAAM,+PAIV,CACI7B,KAAM,cACN6B,KAAM,gPAGNC,cAAe,CACX,CAAE9B,KAAM,mBAAoB6B,KAAM,mQAG9BE,QAAS,CACL,CAAEF,KAAM,6DACR,CAAEA,KAAM,oCACR,CAAEA,KAAM,uCACR,CAAEA,KAAM,4CACR,CAAEA,KAAM,qWAOhB,CAAE7B,KAAM,sBAAuB6B,KAAM,8KAErC,CAAE7B,KAAM,qBAAsB6B,KAAM,wPAGpC,CAAE7B,KAAM,UAAW6B,KAAM,8BAA+BE,QAAS,CACzD,CAAEF,KAAM,yFACR,CAAEA,KAAM,mIACR,CAAEA,KAAM,4EACR,CAAEA,KAAM,+EACR,CAAEA,KAAM,sGAEhB,CAAE7B,KAAM,oCAAqC6B,KAAM,2JAEnD,CAAE7B,KAAM,iBAAkB6B,KAAM,+RAIxC,CACI7B,KAAM,qBACN6B,KAAM,6JAENC,cAAe,CACX,CAAE9B,KAAM,mBAAoB6B,KAAM,4JAElC,CAAE7B,KAAM,cAAe6B,KAAM,4NAG7B,CAAE7B,KAAM,eAAgB6B,KAAM,4IAE9B,CAAE7B,KAAM,4BAA6B6B,KAAM,iMAG3C,CAAE7B,KAAM,+BAAgC6B,KAAM,gGAE9C,CAAE7B,KAAM,gBAAiB6B,KAAM,6VAKvC,CACI7B,KAAM,oBACN6B,KAAM,8DACNE,QAAS,CACL,CACIF,KAAM,4WAMV,CACIA,KAAM,oJAKlB,CACI7B,KAAM,kBACN6B,KAAM,yGACNC,cAAe,CACX,CACI9B,KAAM,oBACN6B,KAAM,4LAGV,CACI7B,KAAM,mBACN6B,KAAM,oMAKlB,CACI7B,KAAM,oBACN6B,KAAM,kMAIdG,eAAgB,CACZ,CAAEhC,KAAM,eAAgB6B,KAAM,0IAC9B,CAAE7B,KAAM,kBAAmB6B,KAAM,mQAEjC,CAAE7B,KAAM,UAAW6B,KAAM,mHACzB,CAAE7B,KAAM,QAAS6B,KAAM,oOAEvB,CAAE7B,KAAM,MAAO6B,KAAM,mOAGzBI,sBAAuB,CACnB,CAAEjC,KAAM,iBAAkB6B,KAAM,6JAEhC,CAAE7B,KAAM,UAAW6B,KAAM,qJAEzB,CAAE7B,KAAM,YAAa6B,KAAM,gKAE3B,CAAE7B,KAAM,eAAgB6B,KAAM,+LAGlCK,OAAQT,SAASU,cAAc,yBAA0B,EACzDC,QAASX,SAASU,cAAc,0BAA2B,EAC3DE,eAAgBZ,SAASU,cAAc,iCAAkC,EACzEG,eAAgB,GAChBC,eAAgB,IA4DhBC,EAAmB,SAAUC,EAAcC,EAAcC,GACzD,IAAKA,EACD,MAAO,8CAAgDF,EAAhD,gFAEmEC,EAAe,OAExF,GAAIC,EAAiB,CACtB,IAAIC,EAAe,GAInB,OAHAD,EAAgBE,KAAI,SAAUC,GAC1BF,GAAgB,OAASE,EAAKjB,KAAO,OACzC,IACO,8CAAgDY,EAAhD,6EAEgEC,EAFhE,kCAG6BE,EAAe,OACvD,CACJ,EAMIG,EAAiB,SAAUC,GAC3B,IAAIC,EAAe,GAenB,OAdKD,EAASjB,QAGVkB,GAAgBT,EAAiBQ,EAAShD,KAAMgD,EAASnB,KAAMmB,EAASjB,SAFxEkB,GAAgBT,EAAiBQ,EAAShD,KAAMgD,EAASnB,MAIzDmB,EAASlB,eACTkB,EAASlB,cAAcoB,SAAQ,SAAUC,GAChCA,EAAYpB,QAGbkB,GAAgBT,EAAiBW,EAAYnD,KAAMmD,EAAYtB,KAAMsB,EAAYpB,SAFjFkB,GAAgBT,EAAiBW,EAAYnD,KAAMmD,EAAYtB,KAIvE,IAEGoB,CACX,EAEIG,EAAe,WACf,GAA4B,QAAxBzB,EAAKY,eAA0B,CAE/Bc,EAAYC,UADS,yGACkBC,OAAO5B,EAAKW,gBACnDe,EAAYG,MAAMC,UAAY,iBAC9BJ,EAAYK,aAAa,QAAS,kBAClCC,YAAW,WACPN,EAAYO,gBAAgB,QAAS,iBACzC,GAAG,IACP,MACK,GAA4B,SAAxBjC,EAAKY,eAA2B,CAErCsB,EAAaP,UADQ,0GACmBC,OAAO5B,EAAKW,gBACpDuB,EAAaL,MAAMC,UAAY,iBAC/BI,EAAaH,aAAa,QAAS,kBACnCC,YAAW,WACPE,EAAaD,gBAAgB,QAAS,iBAC1C,GAAG,IACP,MACK,GAA4B,gBAAxBjC,EAAKY,eAAkC,CAE5CuB,EAAoBR,UADC,iHAC0BC,OAAO5B,EAAKW,gBAC3DwB,EAAoBN,MAAMC,UAAY,iBACtCK,EAAoBJ,aAAa,QAAS,kBAC1CC,YAAW,WACPG,EAAoBF,gBAAgB,QAAS,iBACjD,GAAG,IACP,CACJ,EAMIG,EAAsB,WACtB,IAAIC,EAAevC,SAASwC,iBAAiB,cACzCC,EAAuB,EAE3BF,EAAad,SAAQ,SAAUiB,EAAMC,GACjCF,GAA8CC,EAAKE,YACvD,IAEIH,EAAuBI,EAClBC,EAAiBC,UAAUC,SAAS,gBACrCF,EAAiBC,UAAUE,IAAI,eAG/BH,EAAiBC,UAAUC,SAAS,gBACpCF,EAAiBC,UAAUG,OAAO,cAG9C,EAMItB,EAAc5B,SAASU,cAAc,uBACrC0B,EAAepC,SAASU,cAAc,wBACtC2B,EAAsBrC,SAASU,cAAc,+BAC7CoC,EAAmB9C,SAASU,cAAc,mBAC1CmC,EAAsBC,EAAiBF,cAlIzB,WACd,GAAI1C,EAAKO,OAAQ,CACCT,SAASU,cAAc,iBAG7BmB,UAFO,wJAvBZ3B,EAAKC,cAAciB,KAAI,SAAUG,GACpC,MAAO,0FAA4FA,EAAShD,KAArG,oGAGX,IAAG4E,KAAK,GAsBR,CACA,GAAIjD,EAAKS,QAAS,CACCX,SAASU,cAAc,kBAG7BmB,UAFM,6JAtBZ3B,EAAKK,eAAea,KAAI,SAAUG,GACrC,MAAO,0FAA4FA,EAAShD,KAArG,oGAGX,IAAG4E,KAAK,GAqBR,CACA,GAAIjD,EAAKU,eAAgB,CACCZ,SAASU,cAAc,yBAG7BmB,UAFD,iKArBZ3B,EAAKM,sBAAsBY,KAAI,SAAUG,GAC5C,MAAO,0FAA4FA,EAAShD,KAArG,oGAGX,IAAG4E,KAAK,GAoBR,CACAC,QAAQC,SACZ,CAqHAC,GAEAtD,SAASC,iBAAiB,SAAS,SAAUsD,GAQzC,GAAIA,EAAMC,OAAOC,QAAQ,mCACrBF,EAAMC,OAAOC,QAAQ,mCACrBF,EAAMC,OAAOC,QAAQ,OACzB,CAEI,IAAKF,EAAMC,OAAOT,UAAUC,SAAS,iCAAkC,OACvEO,EAAMC,OAAOT,UAAUE,IAAI,oBAE3B,IADA,IAAIS,EAAQ1D,SAASwC,iBAAiB,kCAC7BxE,EAAI,EAAGA,EAAI0F,EAAMC,OAAQ3F,IAC1B0F,EAAM1F,KAAOuF,EAAMC,QACvBE,EAAM1F,GAAG+E,UAAUG,OAAO,oBAG9B,IAAIU,EAAsBL,EAAMC,OAAOK,YAEvC3D,EAAKW,eAAiB,GAEtB,IAAIiD,EAAcP,EAAMC,OAAOO,QAAQ,MACvC7D,EAAKY,eAAiBgD,EAAYpD,cAAc,oBAAoBzB,MAExC,QAAxBiB,EAAKY,iBACLZ,EAAKC,cAAcsB,SAAQ,SAAUF,GAE5BA,EAAShD,KAAO,UAAUqF,IAC3B1D,EAAKW,gBAAkBS,EAAeC,GAE9C,IACAI,KAEwB,SAAxBzB,EAAKY,iBACLZ,EAAKK,eAAekB,SAAQ,SAAUF,GAC7BA,EAAShD,KAAO,UAAUqF,IAC3B1D,EAAKW,gBAAkBS,EAAeC,GAE9C,IACAI,KAEwB,gBAAxBzB,EAAKY,iBACLZ,EAAKM,sBAAsBiB,SAAQ,SAAUF,GACpCA,EAAShD,KAAO,UAAUqF,IAC3B1D,EAAKW,gBAAkBS,EAAeC,GAE9C,IACAI,KAGJW,IAEAc,QAAQC,SACZ,CAMA,GAAIE,EAAMC,OAAOC,QAAQ,4BACrBF,EAAMC,OAAOC,QAAQ,8BACrBF,EAAMC,OAAOC,QAAQ,+BACzB,CACIvD,EAAKW,eAAiB,GAEtB,IAAImD,EAAkBT,EAAMC,OAAOO,QAAQ,cAC3C7D,EAAKY,eAAiBkD,EAAgBtD,cAAc,oBAAoBzB,MAE5C,QAAxBiB,EAAKY,iBACyB,KAA1Bc,EAAYC,WACZD,EAAYC,UAAY,GACxBD,EAAYO,gBAAgB,WAE5BjC,EAAKC,cAAcsB,SAAQ,SAAUF,GACjCrB,EAAKW,gBAAkBS,EAAeC,EAC1C,IACAI,MAGoB,SAAxBzB,EAAKY,iBAC0B,KAA3BsB,EAAaP,WACbO,EAAaP,UAAY,GACzBO,EAAaD,gBAAgB,WAE7BjC,EAAKK,eAAekB,SAAQ,SAAUF,GAClCrB,EAAKW,gBAAkBS,EAAeC,EAC1C,IACAI,MAGoB,gBAAxBzB,EAAKY,iBACiC,KAAlCuB,EAAoBR,WACpBQ,EAAoBR,UAAY,GAChCQ,EAAoBF,gBAAgB,WAEpCjC,EAAKM,sBAAsBiB,SAAQ,SAAUF,GACzCrB,EAAKW,gBAAkBS,EAAeC,EAC1C,IACAI,MAIRW,GACJ,CAKIiB,EAAMC,OAAOC,QAAQ,+BAErBvD,EAAKW,eAAiB,GACtBX,EAAKY,eAAiByC,EAAMC,OAAOS,uBAAuBJ,YAG9B,QAAxB3D,EAAKY,iBACLc,EAAYC,UAAY,GACxBD,EAAYO,gBAAgB,UAEJ,SAAxBjC,EAAKY,iBACLsB,EAAaP,UAAY,GACzBO,EAAaD,gBAAgB,UAEL,gBAAxBjC,EAAKY,iBACLuB,EAAoBR,UAAY,GAChCQ,EAAoBF,gBAAgB,UAGxCG,IAGR,IAAG,EACP,G","file":"js/report-5c1f82e7063adda80432.js","sourcesContent":[" \t// The module cache\n \tvar installedModules = {};\n\n \t// The require function\n \tfunction __webpack_require__(moduleId) {\n\n \t\t// Check if module is in cache\n \t\tif(installedModules[moduleId]) {\n \t\t\treturn installedModules[moduleId].exports;\n \t\t}\n \t\t// Create a new module (and put it into the cache)\n \t\tvar module = installedModules[moduleId] = {\n \t\t\ti: moduleId,\n \t\t\tl: false,\n \t\t\texports: {}\n \t\t};\n\n \t\t// Execute the module function\n \t\tmodules[moduleId].call(module.exports, module, module.exports, __webpack_require__);\n\n \t\t// Flag the module as loaded\n \t\tmodule.l = true;\n\n \t\t// Return the exports of the module\n \t\treturn module.exports;\n \t}\n\n\n \t// expose the modules object (__webpack_modules__)\n \t__webpack_require__.m = modules;\n\n \t// expose the module cache\n \t__webpack_require__.c = installedModules;\n\n \t// define getter function for harmony exports\n \t__webpack_require__.d = function(exports, name, getter) {\n \t\tif(!__webpack_require__.o(exports, name)) {\n \t\t\tObject.defineProperty(exports, name, { enumerable: true, get: getter });\n \t\t}\n \t};\n\n \t// define __esModule on exports\n \t__webpack_require__.r = function(exports) {\n \t\tif(typeof Symbol !== 'undefined' && Symbol.toStringTag) {\n \t\t\tObject.defineProperty(exports, Symbol.toStringTag, { value: 'Module' });\n \t\t}\n \t\tObject.defineProperty(exports, '__esModule', { value: true });\n \t};\n\n \t// create a fake namespace object\n \t// mode & 1: value is a module id, require it\n \t// mode & 2: merge all properties of value into the ns\n \t// mode & 4: return value when already ns object\n \t// mode & 8|1: behave like require\n \t__webpack_require__.t = function(value, mode) {\n \t\tif(mode & 1) value = __webpack_require__(value);\n \t\tif(mode & 8) return value;\n \t\tif((mode & 4) && typeof value === 'object' && value && value.__esModule) return value;\n \t\tvar ns = Object.create(null);\n \t\t__webpack_require__.r(ns);\n \t\tObject.defineProperty(ns, 'default', { enumerable: true, value: value });\n \t\tif(mode & 2 && typeof value != 'string') for(var key in value) __webpack_require__.d(ns, key, function(key) { return value[key]; }.bind(null, key));\n \t\treturn ns;\n \t};\n\n \t// getDefaultExport function for compatibility with non-harmony modules\n \t__webpack_require__.n = function(module) {\n \t\tvar getter = module && module.__esModule ?\n \t\t\tfunction getDefault() { return module['default']; } :\n \t\t\tfunction getModuleExports() { return module; };\n \t\t__webpack_require__.d(getter, 'a', getter);\n \t\treturn getter;\n \t};\n\n \t// Object.prototype.hasOwnProperty.call\n \t__webpack_require__.o = function(object, property) { return Object.prototype.hasOwnProperty.call(object, property); };\n\n \t// __webpack_public_path__\n \t__webpack_require__.p = \"/packs/\";\n\n\n \t// Load entry module and return exports\n \treturn __webpack_require__(__webpack_require__.s = 12);\n","function reportReady(){\n /**\n * Data state\n */\n\n let data = {\n pciCategories: [\n {\n name: 'Firewalls and Routers',\n text: 'The ASV must scan all network devices such as firewalls and external' +\n 'routers. If a firewall or router is used to establish a demilitarized zone (DMZ), these devices must' +\n 'be included. The ASV scan solution must test for known vulnerabilities and determine whether the ' +\n 'firewall or router is adequately patched.',\n subCategories: [\n { name: 'Wireless Access Points', text: 'The ASV scan solution must scan detected wireless access ' +\n 'points visible from the Internet (over the wire) and detect and report known vulnerabilities ' +\n 'and configuration issues.' }\n ]},\n {\n name: 'Operating Systems',\n text: 'The ASV scan solution must be able to verify that the operating system is' +\n 'patched for known exploits. The ASV scan solution must also be able to determine the version of the' +\n 'operating system and whether it is a version no longer supported by the vendor.'\n },\n {\n name: 'Web Servers',\n text: 'The ASV scan solution must be able to test for all known vulnerabilities and ' +\n 'configuration issues on web servers.The ASV scan solution must also be able to scan the website and' +\n 'verify that directory browsing is not possible on the server.',\n subCategories: [\n { name: 'Web Applications', text: 'The ASV scan solution must be able to detect via automated or' +\n ' manual means current vulnerabilities and configuration issues (for example, OWASP Top 10,' +\n ' SANS CWE Top 25, etc.) including the following web application vulnerabilities and configuration issues:',\n subInfo: [\n { text: 'Unvalidated parameters that lead to SQL injection attacks' },\n { text: 'Cross-site scripting (XSS) flaws' },\n { text: 'Directory traversal vulnerabilities' },\n { text: 'HTTP response splitting/header injection' },\n { text: 'Information leakage, including: Detailed application error messages, ' +\n 'Backup script files (for example,home.asp.bak, index.jsp.old, etc.), ' +\n 'Include file source code disclosure, Insecure HTTP methods enabled, ' +\n 'WebDAV or FrontPage extensions enabled, ' +\n 'Default web server files, ' +\n 'Testing and diagnostics pages (for example, phpinfo.html, test-cgi, etc.)' }]\n },\n { name: 'Application Servers', text: 'The ASV scan solution must be able to detect the presence of ' +\n 'application servers and/or web application servers and detect known vulnerabilities and configuration issues.' },\n { name: 'Common Web Scripts', text: 'The ASV scan solution must be able to detect commonly found scripts ' +\n 'such as common gateway interface (CGI) scripts, e-commerce related scripts (for example, shopping ' +\n 'carts and CRM scripts), ASPs, PHPs, etc. and detect any known vulnerabilities.' },\n { name: 'SSL/TLS', text: 'The ASV scan solution must:', subInfo: [\n { text: 'Detect the presence and versions of cryptographic protocols on a component or service' },\n { text: 'Detect the encryption algorithms and encryption key strengths used in all cryptographic protocols for each component or service' },\n { text: 'Detect the signature-signing algorithms used for all server certificates' },\n { text: 'Detect and report on certificate validity, authenticity and expiration date' },\n { text: 'Detect and report on whether the certificate Common Name or wildcard matches the server hostname' }\n ]},\n { name: 'Anonymous Key-Agreement Protocols', text: 'The ASV scan solution must be able to detect the' +\n ' presence of cryptographic protocols or services which allow anonymous/non-authenticated cipher suites.' },\n { name: 'Embedded Links', text: 'If the ASV scan solution detects embedded code from (or links to) ' +\n 'domains or sources outside of the scan customer’s scope confirm that this code is obtained ' +\n 'from a trusted source, that the embedded links redirect to a trusted source, and that the code is implemented securely' }\n ]},\n {\n name: 'Other Applications',\n text: 'The ASV scan solution must be able to detect and report the presence ' +\n 'of other applications and to detect any known vulnerability and configuration issues.',\n subCategories: [\n { name: 'Database Servers', text: 'The ASV scan solution must be able to detect open access to databases ' +\n 'from the Internet. This configuration is a violation of PCI DSS Requirement 1.3.6.' },\n { name: 'DNS Servers', text: 'The ASV scan solution must be able to detect the presence of DNS servers, ' +\n 'perform forward and reverse DNS lookups,and detect any known vulnerability and configuration issues, ' +\n 'including unrestricted DNS zone transfer.' },\n { name: 'Mail Servers', text: 'The ASV scan solution must be able to detect the presence of mail servers ' +\n 'and detect any known vulnerabilities and configuration issues.' },\n { name: 'Virtualization Components', text: 'The ASV scan solution must be able to detect and identify ' +\n 'vulnerabilities in any accessible hypervisor as well as known vulnerabilities and configuration ' +\n 'issues with virtualized components.' },\n { name: 'Point-of-Sale (POS) Software', text: 'If the ASV scan solution detects point-of-sale (POS) ' +\n 'software and any known vulnerabilities.' },\n { name: 'Remote Access', text: 'The ASV scan solution must be able to detect the presence of remote ' +\n 'access software and detect any known vulnerability or configuration issues. ' +\n 'Remote access software includes, but is not limited to: VPN (IPSec, PPTP), applications such ' +\n 'as LogMeIn, GoToMyPC, pcAnywhereandVNC, Terminal Server, remote web-based administration, SSH, and Telnet.' }\n ]},\n {\n name: 'Built-in Accounts',\n text: 'The ASV scan solution must be able to detect the following:',\n subInfo: [\n {\n text: 'The presence of built-in or default accounts and passwords, ' +\n 'not by using brute-force or dictionary attacks, but rather by' +\n ' concentrating on known built-in or default accounts using default passwords' +\n ' — for example, as published by software vendors or vulnerability reference sources. ' +\n 'Any such vulnerability must be marked as an automatic failure by the ASV.'\n },\n {\n text: 'Report on services that are available without authentication—for example, ' +\n 'services that require a username but do not require a password.'\n }\n ]\n },\n {\n name: 'Common Services',\n text: 'The ASV scan solution must be able to detect and report common services known to have vulnerabilities.',\n subCategories: [\n {\n name: 'Insecure Services',\n text: 'The ASV scan solution detects insecure services or industry-deprecated protocols (such as SHA-1)' +\n ' and/or services that transmit username and passwords as clear text (without encryption)'\n },\n {\n name: 'Unknown Services',\n text: 'The ASV scan solution must be able to detect ports, protocols and services ' +\n 'that cannot be remotely identifie as they may indicate malicious activity such as backdoors, ' +\n 'malware, rootkits, etc'\n },\n ]},\n {\n name: 'Backdoors/Malware',\n text: 'The ASV scan solution must detect and report all known, remotely-detectable backdoor ' +\n 'applications. The presence of any such malware, including rootkits, backdoors, and Trojan horse programs'\n }\n ],\n vrmsCategories: [\n { name: 'Network & OS', text: 'The site was tested against all network-based, and operating system vulnerabilities, including patches/hotfixes and zero-day findings.' },\n { name: 'Web Application', text: 'The web server and web application were tested against security vulnerabilities such as cross-site scripting, SQL Injection, command Injection,' +\n 'path traversal, and insecure server configurations including all vulnerabilities identified in the OWASP Top 10.' },\n { name: 'Malware', text: 'Comprehensive malware infection scans were performed against the underlying operating system and the web pages.' },\n { name: 'HIPAA', text: 'The website has been tested according to the guidelines set forth in HIPAA section 164.312. ' +\n 'The scan checked for vulnerabilities, insufficient access control, insufficient auditing, and lack of encryption or weak encryption.' },\n { name: 'SOX', text: 'The site was tested against controls indicated in the SOX compliance guidelines (Section 302,' +\n ' Section 404, and Section 409) such as threats to digital data integrity, data access auditing, accountability, and availability.' },\n ],\n penetrationCategories: [\n { name: 'Reconnaissance', text: 'Potentially useful information was collected during this phase, such as IP addresses,' +\n ' domains, subdomain names, types, and versions of technologies used.' },\n { name: 'Mapping', text: 'The scanner increased visibility on the most critical and exposed elements of the site' +\n ' to ensure all the functionalities of a target were tested.' },\n { name: 'Discovery', text: 'The site was tested for operating system, network, and webapp vulnerabilities to ' +\n 'identify areas that can be exploited and lead to a compromised target host.' },\n { name: 'Exploitation', text: 'All possible exploitations of the flaws identified in the previous step were tested ' +\n 'to identify holes that could lead to unauthorized access, re-direction, defamation, and other threats.' },\n ],\n hasPci: document.querySelector('#pci-card-more-info') || false, // Checks if the current domain has Pci\n hasVrms: document.querySelector('#vrms-card-more-info') || false, // Checks if the current domain has Vrms\n hasPenetration: document.querySelector('#penetration-card-more-info') || false, // Checks if the current domain has Penetration\n moreInfoMarkup: '',\n currentProduct: '', // The product that the user is interacting (menu list click, product details click)\n }\n\n\n /**\n * Methods\n */\n\n /**\n * Navigation Menu Rendering\n */\n let pciMenuTemplate = function () {\n return data.pciCategories.map(function (category) {\n return '
' + categoryText + '
'\n }\n else if (categorySubText) {\n let liTagSubInfo = ''\n categorySubText.map(function (item) {\n liTagSubInfo += '' + categoryText + '
' +\n 'element that is hidden.\n\n if (data.currentProduct === 'pci') {\n pciMoreInfo.innerHTML = ''\n pciMoreInfo.removeAttribute('style')\n }\n if (data.currentProduct === 'vrms') {\n vrmsMoreInfo.innerHTML = ''\n vrmsMoreInfo.removeAttribute('style')\n }\n if (data.currentProduct === 'penetration') {\n penetrationMoreInfo.innerHTML = ''\n penetrationMoreInfo.removeAttribute('style')\n }\n\n adjustWrapperHeight()\n }\n\n }, false);\n}\n\ndocument.addEventListener(\"DOMContentLoaded\", reportReady )"],"sourceRoot":""}