Lumension® Endpoint Intelligence Center

Lumension® Endpoint Intelligence Center

Accurate. Current. Accessible.


File Lookup

Upload a binary file:
Or provide a hash file:
SHA-1 hash:
MD5 hash:
SHA-256 hash:


Learn More »

Malware Analysis

Upload a suspect file:

Provide your email address:
Email:  Why?

Learn More »

Application Scanner

Discover all applications and executables in your environment »

Device Scanner

Discover all removable storage devices used in your environment »

Vulnerability Scanner

Discover all OS and application vulnerabilities in your environment »

Threats

Risk Name Type
MEDIUM
WORM
MEDIUM
TROJAN
LOW
TROJAN
LOW
WORM
MEDIUM
WORM

Vulnerabilities

Score CVE Id Summary
4.6
Unspecified vulnerability...
Unknown
The Cron service in rpc.p...
Unknown
The Belkin N300 (F7D7301v...
Unknown
Cross-site request forger...
Unknown
Cross-site request forger...

Patches

Impact Identifier Summary
Critical
Red Hat 2014:1307-01 RHSA...
Critical
Red Hat 2014:1306-01 RHSA...
Critical
Red Hat 2014:1306-01 RHSA...
Critical
Red Hat 2014:1307-01 RHSA...
Critical
SUN126547-06 Solaris 10 x...

File Lookup

Upload a binary file:
Or provide a hash file:
SHA-1 hash:
MD5 hash:
SHA-256 hash:


Malware Analysis

Upload a suspect file:

Provide your email address:
Email:  Why?


Last Updated: 30 Sep 2014 10:16:12