Lumension® Endpoint Intelligence Center

Lumension® Endpoint Intelligence Center

Accurate. Current. Accessible.


File Lookup

Upload a binary file:
Or provide a hash file:
SHA-1 hash:
MD5 hash:
SHA-256 hash:


Learn More »

Malware Analysis

Upload a suspect file:

Provide your email address:
Email:  Why?

Learn More »

Application Scanner

Discover all applications and executables in your environment »

Device Scanner

Discover all removable storage devices used in your environment »

Vulnerability Scanner

Discover all OS and application vulnerabilities in your environment »

Threats

Risk Name Type
MEDIUM
WORM
MEDIUM
TROJAN
LOW
TROJAN
LOW
WORM
MEDIUM
WORM

Vulnerabilities

Score CVE Id Summary
4.0
server_user_groups.php in...
3.5
Multiple cross-site scrip...
3.5
Cross-site scripting (XSS...
5.0
MIT Kerberos 5 (aka krb5)...
5.0
MIT Kerberos 5 (aka krb5)...

Patches

Impact Identifier Summary
Critical
Red Hat 2014:0907-01 RHSA...
Critical
Red Hat 2014:0907-01 RHSA...
Critical - 01
F-Secure Anti-Virus DEF F...
Critical - 01
Sophos Anti-Virus IDE fil...
Critical - 01
Sophos Anti-Virus IDE fil...

File Lookup

Upload a binary file:
Or provide a hash file:
SHA-1 hash:
MD5 hash:
SHA-256 hash:


Malware Analysis

Upload a suspect file:

Provide your email address:
Email:  Why?


Last Updated: 22 Jul 2014 10:01:17