Research Article

An Invocation Chain Test and Evaluation Method for Fog Computing

Table 2

Distribution of vulnerabilities in networks.

Host numberApplicationVulnerability numberPort number

192.168.0.1tomcat 7.0.39CVE-2016-444480
192.168.0.2telnetCVE-2018-001423
192.168.1.1IIS FTP7.5CVE-2015-397221
192.168.1.2
192.168.2.1PHP, tomcatCVE-2017-942780
192.168.2.2RPCCVE-2016-3175135
192.168.2.3core ftpCVE-2017-464321