Jump to content
  • Checkout
  • Login
  • Get in touch

osCommerce

The e-commerce.

osCommerce VTS


Guest

Recommended Posts

Les

 

Not that I can think of

 

Did you do this step?

 

* Copy one of the following files to the AV directory and rename it to validfiles.def

 

validfiles_231.def

validfiles_ms2.def

validfiles_rc2a.def

 

Cheers

 

G

Need help installing add ons/contributions, cleaning a hacked site or a bespoke development, check my profile

 

Virus Threat Scanner

My Contributions

Basic install answers.

Click here for Contributions / Add Ons.

UK your site.

Site Move.

Basic design info.

 

For links mentioned in old answers that are no longer here follow this link Useful Threads.

 

If this post was useful, click the Like This button over there ======>>>>>.

Link to comment
Share on other sites

Yeah geoff done that it appears to be working if i use the Grep function and search for a string in a specified folder it finds the files but when I run a full scan the page just continuously loads

 

displaying

Loaded 300 virus definitions

Loaded 64 files definitions

Loaded 687 valid file name

 

what out put should be showing after it has loaded in the def files ?

Link to comment
Share on other sites

  • 3 years later...
Hi

 

Managed to run the Virus checker 

 

Are these false positives I have add many security features and file edits

 

File could be a potentional threat: /mydomain.com/public_html/cookie_usage.php  (Known filename threat)

Possible Infection: /mydomain.com/public_html/admin/AV/grep.php (Known automated hack <=> error_reporting(0) ) on line: 44

Possible Infection: /mydomain.com/public_html/admin/av.php (Known automated hack <=> error_reporting(0) ) on line: 11

Possible Infection: /mydomain.com/public_html/admin/modules.php (Known automated hack <=> eval( ) on line: 212

 

File could be a potentional threat: /mydomain.com/public_html/admin/includes/languages/english/mail.php  (Known filename threat)

 

Possible Infection: /mydomain.com/public_html/admin/includes/modules/newsletters/product_notification.php (Known automated hack <=> eval( ) on line: 61

Possible Infection: /mydomain.com/public_html/admin/includes/functions/general.php (Known automated hack <=> eval( ) on line: 405

Possible Infection: /mydomain.com/public_html/admin/includes/javascript/spiffyCal/spiffyCal_v2_1.js (Known automated hack <=> eval( ) on line: 76

Possible Infection: /mydomain.com/public_html/admin/includes/javascript/calendarcode.js (Known automated hack <=> eval( ) on line: 57

Possible Infection: /mydomain.com/public_html/admin/configuration.php (Known automated hack <=> eval( ) on line: 125

File could be a potentional threat: /mydomain.com/public_html/admin/mail.php  (Known filename threat)

File could be a potentional threat: /mydomain.com/public_html/includes/languages/english/cookie_usage.php  (Known filename threat)

Possible Infection: /mydomain.com/public_html/includes/functions/compatibility.php (Known automated hack <=> eval( ) on line: 86

Possible Infection: /mydomain.com/public_html/includes/functions/general.php (Known automated hack <=> eval( ) on line: 486

Possible Infection: /mydomain.com/public_html/includes/osc_sec.php (Known automated hack <=> eval(base64_decode ) on line: 408

Possible Infection: /mydomain.com/public_html/includes/osc_sec.php (Known automated hack <=> eval( ) on line: 408

Possible Infection: /mydomain.com/public_html/includes/osc_sec.php (Known automated hack <=> iframe) on line: 412

Possible Infection: /mydomain.com/public_html/includes/osc_sec.php (Known automated hack <=> passthru ) on line: 445

Possible Infection: /mydomain.com/public_html/includes/osc_sec.php (Known automated hack <=> shell_exec ) on line: 410

Possible Infection: /mydomain.com/public_html/includes/index.html (Htaccess Rewrite <=> ErrorDocument ) on line: 9

Possible Infection: /mydomain.com/public_html/includes/.htaccess (Htaccess Rewrite <=> RewriteRule .* http: ) on line: 30

Possible Infection: /mydomain.com/public_html/.htaccess (Htaccess Rewrite <=> mod_rewrite.c ) on line: 102

Possible Infection: /mydomain.com/public_html/.htaccess (Htaccess Rewrite <=> ErrorDocument ) on line: 47

Possible Infection: /mydomain.com/public_html/.htaccess (Known automated hack <=> passthru ) on line: 120

Possible Infection: /mydomain.com/public_html/.htaccess (Known automated hack <=> shell_exec ) on line: 126

 

 

HAVE renamed admin did not setup the ftp part of the scanner

 

Also added .htaccess security and osc_sec , security pro. 

 

Oscommerce ms2.2 I know it's old.

Edited by jamo32

Using Bootstrap 8-)

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...