Jump to content
sijo

osCommerce VTS

Recommended Posts

Geoff Installed all okay but when I run I get

Loaded 300 virus definitions and nothing else Browser just stays loading the page, Am i missing something?

Share this post


Link to post
Share on other sites

Les

 

Not that I can think of

 

Did you do this step?

 

* Copy one of the following files to the AV directory and rename it to validfiles.def

 

validfiles_231.def

validfiles_ms2.def

validfiles_rc2a.def

 

Cheers

 

G


Need help installing add ons/contributions, cleaning a hacked site or a bespoke development, check my profile

 

Virus Threat Scanner

My Contributions

Basic install answers.

Click here for Contributions / Add Ons.

UK your site.

Site Move.

Basic design info.

 

For links mentioned in old answers that are no longer here follow this link Useful Threads.

 

If this post was useful, click the Like This button over there ======>>>>>.

Share this post


Link to post
Share on other sites

Yeah geoff done that it appears to be working if i use the Grep function and search for a string in a specified folder it finds the files but when I run a full scan the page just continuously loads

 

displaying

Loaded 300 virus definitions

Loaded 64 files definitions

Loaded 687 valid file name

 

what out put should be showing after it has loaded in the def files ?

Share this post


Link to post
Share on other sites
Hi

 

Managed to run the Virus checker 

 

Are these false positives I have add many security features and file edits

 

File could be a potentional threat: /mydomain.com/public_html/cookie_usage.php  (Known filename threat)

Possible Infection: /mydomain.com/public_html/admin/AV/grep.php (Known automated hack <=> error_reporting(0) ) on line: 44

Possible Infection: /mydomain.com/public_html/admin/av.php (Known automated hack <=> error_reporting(0) ) on line: 11

Possible Infection: /mydomain.com/public_html/admin/modules.php (Known automated hack <=> eval( ) on line: 212

 

File could be a potentional threat: /mydomain.com/public_html/admin/includes/languages/english/mail.php  (Known filename threat)

 

Possible Infection: /mydomain.com/public_html/admin/includes/modules/newsletters/product_notification.php (Known automated hack <=> eval( ) on line: 61

Possible Infection: /mydomain.com/public_html/admin/includes/functions/general.php (Known automated hack <=> eval( ) on line: 405

Possible Infection: /mydomain.com/public_html/admin/includes/javascript/spiffyCal/spiffyCal_v2_1.js (Known automated hack <=> eval( ) on line: 76

Possible Infection: /mydomain.com/public_html/admin/includes/javascript/calendarcode.js (Known automated hack <=> eval( ) on line: 57

Possible Infection: /mydomain.com/public_html/admin/configuration.php (Known automated hack <=> eval( ) on line: 125

File could be a potentional threat: /mydomain.com/public_html/admin/mail.php  (Known filename threat)

File could be a potentional threat: /mydomain.com/public_html/includes/languages/english/cookie_usage.php  (Known filename threat)

Possible Infection: /mydomain.com/public_html/includes/functions/compatibility.php (Known automated hack <=> eval( ) on line: 86

Possible Infection: /mydomain.com/public_html/includes/functions/general.php (Known automated hack <=> eval( ) on line: 486

Possible Infection: /mydomain.com/public_html/includes/osc_sec.php (Known automated hack <=> eval(base64_decode ) on line: 408

Possible Infection: /mydomain.com/public_html/includes/osc_sec.php (Known automated hack <=> eval( ) on line: 408

Possible Infection: /mydomain.com/public_html/includes/osc_sec.php (Known automated hack <=> iframe) on line: 412

Possible Infection: /mydomain.com/public_html/includes/osc_sec.php (Known automated hack <=> passthru ) on line: 445

Possible Infection: /mydomain.com/public_html/includes/osc_sec.php (Known automated hack <=> shell_exec ) on line: 410

Possible Infection: /mydomain.com/public_html/includes/index.html (Htaccess Rewrite <=> ErrorDocument ) on line: 9

Possible Infection: /mydomain.com/public_html/includes/.htaccess (Htaccess Rewrite <=> RewriteRule .* http: ) on line: 30

Possible Infection: /mydomain.com/public_html/.htaccess (Htaccess Rewrite <=> mod_rewrite.c ) on line: 102

Possible Infection: /mydomain.com/public_html/.htaccess (Htaccess Rewrite <=> ErrorDocument ) on line: 47

Possible Infection: /mydomain.com/public_html/.htaccess (Known automated hack <=> passthru ) on line: 120

Possible Infection: /mydomain.com/public_html/.htaccess (Known automated hack <=> shell_exec ) on line: 126

 

 

HAVE renamed admin did not setup the ftp part of the scanner

 

Also added .htaccess security and osc_sec , security pro. 

 

Oscommerce ms2.2 I know it's old.

Edited by jamo32

Using Bootstrap 8-)

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×