![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.11329 |
Category: | Windows |
Title: | The remote host is infected by a virus |
Summary: | NOSUMMARY |
Description: | Description: This script checks for the presence of different virii on the remote host, by using the SMB credentials you provide Nessus with. - W32/Badtrans-B - JS_GIGGER.A@mm - W32/Vote-A - CodeRed - W32.Sircam.Worm@mm - W32.HLLW.Fizzer@mm - W32.Sobig.B@mm - W32.Sobig.E@mm - W32.Sobig.F@mm - W32.Sobig.C@mm - W32.Yaha.J@mm - W32.mimail.a@mm - W32.mimail.c@mm - W32.mimail.e@mm - W32.mimail.l@mm - W32.mimail.p@mm - W32.Welchia.Worm - W32.Randex.Worm - W32.Beagle.A - W32.Novarg.A - Vesser - NetSky.C - Doomran.a - Beagle.m - Beagle.j - Agobot.FO - NetSky.W - Sasser - W32.Wallon.A - W32.MyDoom.M - Hackarmy.i - W32.Erkez.D/Zafi.d Solution : See the URLs which will appear in the report Risk factor : High |
Copyright | This script is Copyright (C) 2003 Renaud Deraison |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |