Am 24.07.2014 13:49, schrieb Michael Meyer: > *** Reindl Harald wrote: > >> how *laughable is that* develop a security scanner and not patch >> the own wiki of the scanner software? > > This server ist hosted and managed by a community member and not > by the OpenVAS team
hosted maybe, managed - no way - Heartbleed is not new don't matter as long it's under the offical domain some would expect for good reasons that subdomains below "openvas.org" are scanned regulary for "eat your own dogfood" now it is redirected to "wiki.openvas.com" which is using the identical wrong wildcard-cert, has the same leaks and IP * This server is vulnerable to the OpenSSL CCS vulnerability (CVE-2014-0224) * This server is vulnerable to the Heartbleed attack * The server does not support Forward Secrecy with the reference browsers wo is "*.red-net.info" and why that careless with CN?
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Openvas-discuss mailing list [email protected] https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
