Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Peer-To-Peer File Sharing >> Trillian is installed


Vulnerability Assessment Details

Trillian is installed

Vulnerability Assessment Summary
Acertains if Trillian is installed

Detailed Explanation for this Vulnerability Assessment

The remote host is using Trillian - a p2p software,
which may not be suitable for a business environment.

Solution : Uninstall this software
Network Security Threat Level: Low

Networks Security ID: 5677, 5733, 5755, 5765, 5769, 5775, 5776, 5777, 5783

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Xue Yong Zhi

Cables, Connectors

Check Point CheckPoint 12200 8port Gigabit Firewall Appliance P-210 CPAP-SG12200
$599.95
Check Point CheckPoint 12200 8port Gigabit Firewall Appliance P-210 CPAP-SG12200 pictureCheck Point UTM1-270 Rackmount 4 Port Gigabit pfSense® Firewall Router U-10
$119.99
Check Point UTM1-270 Rackmount 4 Port Gigabit pfSense® Firewall Router U-10 pictureCheck Point CheckPoint 4800 8 Port Gigabit Firewall Appliance T-180 CPAP-SG4800
$349.95
Check Point CheckPoint 4800 8 Port Gigabit Firewall Appliance T-180 CPAP-SG4800 pictureCheck Point UTM1-570 Rackmount 6 Port Gigabit pfSense® Firewall Router U-20
$139.99
Check Point UTM1-570 Rackmount 6 Port Gigabit pfSense® Firewall Router U-20 picture


Discussions

No Discussions have been posted on this vulnerability.