Editors' Note: You'll have to register on the publisher site to be able to run this program.
The Conficker worm utilizes a variety of attack vectors to transmit and receive payloads, including: software vulnerabilities (e.g. MS08-067), portable media devices (e.g. USB thumb drives and hard drives), as well as leveraging endpoint weaknesses (e.g. weak passwords on network-enabled systems). The Conficker worm will also spawn remote access backdoors on the system and attempt to download additional malware to further infect the host. Retina Community includes vulnerability audits for Conficker.
What's new in this version:
Version 5.14 includes vulnerability audits for Conficker.