Am 24.07.2014 13:49, schrieb Michael Meyer:
> *** Reindl Harald wrote:
> 
>> how *laughable is that* develop a security scanner and not patch
>> the own wiki of the scanner software?
> 
> This server ist hosted and managed by a community member and not 
> by the OpenVAS team

hosted maybe, managed - no way - Heartbleed is not new
don't matter as long it's under the offical domain

some would expect for good reasons that subdomains
below "openvas.org" are scanned regulary for "eat
your own dogfood"

now it is redirected to "wiki.openvas.com" which is using the
identical wrong wildcard-cert, has the same leaks and IP

* This server is vulnerable to the OpenSSL CCS vulnerability (CVE-2014-0224)
* This server is vulnerable to the Heartbleed attack
* The server does not support Forward Secrecy with the reference browsers

wo is "*.red-net.info" and why that careless with CN?

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to