![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.80043 |
Category: | Windows |
Title: | The remote host is infected by a virus |
Summary: | This script checks for the presence of different virii on the remote; host, by using the SMB credentials you provide the scanner with. |
Description: | Summary: This script checks for the presence of different virii on the remote host, by using the SMB credentials you provide the scanner with. Vulnerability Insight: The following virii are checked: - W32/Badtrans-B - JS_GIGGER.A@mm - W32/Vote-A - W32/Vote-B - CodeRed - W32.Sircam.Worm@mm - W32.HLLW.Fizzer@mm - W32.Sobig.B@mm - W32.Sobig.E@mm - W32.Sobig.F@mm - W32.Sobig.C@mm - W32.Yaha.J@mm - W32.mimail.a@mm - W32.mimail.c@mm - W32.mimail.e@mm - W32.mimail.l@mm - W32.mimail.p@mm - W32.Welchia.Worm - W32.Randex.Worm - W32.Beagle.A - W32.Novarg.A - Vesser - NetSky.C - Doomran.a - Beagle.m - Beagle.j - Agobot.FO - NetSky.W - Sasser - W32.Wallon.A - W32.MyDoom.M - W32.MyDoom.AI - W32.MyDoom.AX - W32.Aimdes.B - W32.Aimdes.C - W32.ahker.D - Hackarmy.i - W32.Erkez.D/Zafi.d - Winser-A - Berbew.K - Hotword.b - W32.Backdoor.Ginwui.B - W32.Wargbot - W32.Randex.GEL - W32.Fujacks.B Solution: See the URLs which will appear in the report. CVSS Score: 7.6 CVSS Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C |
Copyright | Copyright (C) 2008 Tenable Network Security |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |