Research Article
An Invocation Chain Test and Evaluation Method for Fog Computing
Table 2
Distribution of vulnerabilities in networks.
| Host number | Application | Vulnerability number | Port number |
| 192.168.0.1 | tomcat 7.0.39 | CVE-2016-4444 | 80 | 192.168.0.2 | telnet | CVE-2018-0014 | 23 | 192.168.1.1 | IIS FTP7.5 | CVE-2015-3972 | 21 | 192.168.1.2 | — | — | — | 192.168.2.1 | PHP, tomcat | CVE-2017-9427 | 80 | 192.168.2.2 | RPC | CVE-2016-3175 | 135 | 192.168.2.3 | core ftp | CVE-2017-4643 | 21 |
|
|