Summary
This script checks for the presence of files and programs which might have been installed without the consent of the user of the remote host.
Verify each of the applications found to see if they are compliant with your organization's security policy.
Solution
See the URLs which will appear in the report
Severity
Classification
-
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Microsoft Office Products Insecure Library Loading Vulnerability
- SecureCRT SSH1 protocol version string overflow
- Microsoft Windows NSlookup.exe Remote Code Execution Vulnerability
- Microsoft Windows Progman Group Converter Insecure Library Loading Vulnerability
- Computer Associates WebScan ActiveX Control Multiple Remote Code Execution Vulnerabilities